Fusion of radar and ultrasound sensors for concealed weapons detection
NASA Astrophysics Data System (ADS)
Felber, Franklin S.; Davis, Herbert T., III; Mallon, Charles E.; Wild, Norbert C.
1996-06-01
An integrated radar and ultrasound sensor, capable of remotely detecting and imaging concealed weapons, is being developed. A modified frequency-agile, mine-detection radar is intended to specify with high probability of detection at ranges of 1 to 10 m which individuals in a moving crowd may be concealing metallic or nonmetallic weapons. Within about 1 to 5 m, the active ultrasound sensor is intended to enable a user to identify a concealed weapon on a moving person with low false-detection rate, achieved through a real-time centimeter-resolution image of the weapon. The goal for sensor fusion is to have the radar acquire concealed weapons at long ranges and seamlessly hand over tracking data to the ultrasound sensor for high-resolution imaging on a video monitor. We have demonstrated centimeter-resolution ultrasound images of metallic and non-metallic weapons concealed on a human at ranges over 1 m. Processing of the ultrasound images includes filters for noise, frequency, brightness, and contrast. A frequency-agile radar has been developed by JAYCOR under the U.S. Army Advanced Mine Detection Radar Program. The signature of an armed person, detected by this radar, differs appreciably from that of the same person unarmed.
Concealed weapons detection using electromagnetic resonances
NASA Astrophysics Data System (ADS)
Hunt, Allen R.; Hogg, R. Douglas; Foreman, William
1998-12-01
Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the size of a CD ROM drive of a computer.
Microwave Technique for Detecting and Locating Concealed Weapons
DOT National Transportation Integrated Search
1971-12-01
The subject of this report is the evaluation of a microwave technique for detecting and locating weapons concealed under clothing. The principal features of this technique are: persons subjected to search are not exposed to 'objectional' microwave ra...
Detection and identification of concealed weapons using matrix pencil
NASA Astrophysics Data System (ADS)
Adve, Raviraj S.; Thayaparan, Thayananthan
2011-06-01
The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.
Open-area concealed-weapon detection system
NASA Astrophysics Data System (ADS)
Pati, P.; Mather, P.
2011-06-01
Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.
Protection of Public Figures. Symposium Proceedings, May 16-18, 1972
1972-01-01
192 EXPLOSIVE TRACE VAPOR DETECTION, Maryland D. Keyrw, USAMERDC.. 194 ATOMIC AND MOLECULAR DETECTION...subject through a doorway, a hallway, a portal, a fence, and thus subject him to co- vert surveillance for weapons or explosives concealed on his person...who has weapons or conceal- ed explosives on his person. So insofar as 4ERDC is concerned, the two broad scenarios that we will be talking about are
Passive millimeter-wave concealed weapon detection
NASA Astrophysics Data System (ADS)
Sinclair, Gordon N.; Anderton, Rupert N.; Appleby, Roger
2001-02-01
A method of detecting weapons concealed under clothing using passive millimeter wave imaging is described. The optical properties of clothing are discussed and examples given of the spectral reflectivity and transmission. The transmission tends to be constant from 60 to 150 GHz above which it decreases for some clothing materials. The transmission of a cotton T-shirt is typically 95% and of a leather jacket up to 85% at lower frequencies. A model is presented for calculating the contrast of a metallic concealed weapon when hidden under clothing and it indicates contrasts as large as 200 K can be realized outdoors. The advantages of real time over static frame imagery are discussed. It is concluded that real time imagery offers considerable advantages as weapons can be very varied in size, position and orientation and movement offers vital clues to the human observer which aid the recognition process.
Image fusion based on millimeter-wave for concealed weapon detection
NASA Astrophysics Data System (ADS)
Zhu, Weiwen; Zhao, Yuejin; Deng, Chao; Zhang, Cunlin; Zhang, Yalin; Zhang, Jingshui
2010-11-01
This paper describes a novel multi sensors image fusion technology which is presented for concealed weapon detection (CWD). It is known to all, because of the good transparency of the clothes at millimeter wave band, a millimeter wave radiometer can be used to image and distinguish concealed contraband beneath clothes, for example guns, knives, detonator and so on. As a result, we adopt the passive millimeter wave (PMMW) imaging technology for airport security. However, in consideration of the wavelength of millimeter wave and the single channel mechanical scanning, the millimeter wave image has law optical resolution, which can't meet the need of practical application. Therefore, visible image (VI), which has higher resolution, is proposed for the image fusion with the millimeter wave image to enhance the readability. Before the image fusion, a novel image pre-processing which specifics to the fusion of millimeter wave imaging and visible image is adopted. And in the process of image fusion, multi resolution analysis (MRA) based on Wavelet Transform (WT) is adopted. In this way, the experiment result shows that this method has advantages in concealed weapon detection and has practical significance.
Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program
NASA Astrophysics Data System (ADS)
Paulter, Nicholas G.
1998-12-01
The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.
Standoff concealed weapon detection using a 350-GHz radar imaging system
NASA Astrophysics Data System (ADS)
Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.
2010-04-01
The sub-millimeter (sub-mm) wave frequency band from 300 - 1000 GHz is currently being developed for standoff concealed weapon detection imaging applications. This frequency band is of interest due to the unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff detection. Standoff concealed weapon and explosive detection is a pressing national and international need for both civilian and military security, as it may allow screening at safer distances than portal screening techniques. PNNL has developed a prototype active wideband 350 GHz radar imaging system based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. This prototype system operates at ranges up to 10+ meters, and can acquire an image in 10 - 20 seconds, which is fast enough to scan cooperative personnel for concealed weapons. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. During the past year, several improvements to the system have been designed and implemented, including increased imaging speed using improved balancing techniques, wider bandwidth, and improved image processing techniques. In this paper, the imaging system is described in detail and numerous imaging results are presented.
Detection and classification of concealed weapons using a magnetometer-based portal
NASA Astrophysics Data System (ADS)
Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.
2002-08-01
A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.
Color image fusion for concealed weapon detection
NASA Astrophysics Data System (ADS)
Toet, Alexander
2003-09-01
Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.
Small threat and contraband detection with TNA-based systems.
Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T
2005-01-01
The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
Goldstein, Adam O; Viera, Anthony J; Pierson, John; Barnhouse, Kathy K; Tulsky, James A; Richman, Barak D
2015-06-01
Law enforcement officials have asked health care providers to evaluate patient applications for concealed weapon permits. The current study was designed to examine physician beliefs regarding competency to carry a concealed weapon for patients with specific physical and mental conditions. Among 222 North Carolina physicians who participated in this survey (40% response rate), large variation and uncertainty existed for determining competency. Physicians most frequently chose mild dementia, post-traumatic stress disorder, and recent depression as conditions that would render a patient not competent to carry a concealed weapon. Male physicians and those owning a gun were more likely to deem a patient competent. Almost a third of physicians were unsure about competence for most conditions. Physicians asked to assess competency of patients to carry a concealed weapon have quite disparate views on competency and little confidence in their decisions. If physicians are expected to assess patient competence to carry a concealed weapon, more objective criteria and training are needed. Copyright © 2015 John Wiley & Sons, Ltd.
Portable concealed weapon detection using millimeter-wave FMCW radar imaging
NASA Astrophysics Data System (ADS)
Johnson, Michael A.; Chang, Yu-Wen
2001-02-01
Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.
NASA Astrophysics Data System (ADS)
Yeom, Seokwon
2013-05-01
Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.
Noise analysis for near field 3-D FM-CW radar imaging systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.
2015-06-19
Near field radar imaging systems are used for several applications including concealed weapon detection in airports and other high-security venues. Despite the near-field operation, phase noise and thermal noise can limit the performance in several ways including reduction in system sensitivity and reduction of image dynamic range. In this paper, the effects of thermal noise, phase noise, and processing gain are analyzed in the context of a near field 3-D FM-CW imaging radar as might be used for concealed weapon detection. In addition to traditional frequency domain analysis, a time-domain simulation is employed to graphically demonstrate the effect of thesemore » noise sources on a fast-chirping FM-CW system.« less
Beam Width Robustness of a 670 GHz Imaging Radar
NASA Technical Reports Server (NTRS)
Cooper, K. B.; Llombart, N.; Dengler, R. J.; Siegel, P. H.
2009-01-01
Detection of a replica bomb belt concealed on a mannequin at 4 m standoff range is achieved using a 670 GHz imaging radar. At a somewhat larger standoff range of 4.6 m, the radar's beam width increases substantially, but the through-shirt image quality remains good. This suggests that a relatively modest increase in aperture size over the current design will be sufficient to detect person-borne concealed weapons at ranges exceeding 25 meters.
Impact of frequency and polarization diversity on a terahertz radar's imaging performance
NASA Astrophysics Data System (ADS)
Cooper, Ken B.; Dengler, Robert J.; Llombart, Nuria
2011-05-01
The Jet Propulsion Laboratory's 675 GHz, 25 m standoff imaging radar can achieve >1 Hz real time frame rates over 40x40 cm fields of view for rapid detection of person-borne concealed weapons. In its normal mode of operation, the radar generates imagery based solely on the time-of-flight, or range, between the radar and target. With good clothing penetration at 675 GHz, a hidden object will be detectable as an anomaly in the range-to-surface profile of a subject. Here we report on results of two modifications in the radar system that were made to asses its performance using somewhat different detection approaches. First, the radar's operating frequency and bandwidth were cut in half, to 340 GHz and 13 GHz, where there potential system advantages include superior transmit power and clothing penetration, as well as a lower cost of components. In this case, we found that the twofold reduction in range and cross-range resolution sharply limited the quality of through-clothes imagery, although some improvement is observed for detection of large targets concealed by very thick clothing. The second radar modification tested involved operation in a fully polarimetric mode, where enhanced image contrast might occur between surfaces with different material or geometric characteristics. Results from these tests indicated that random speckle dominates polarimetric power imagery, making it an unattractive approach for contrast improvement. Taken together, the experiments described here underscore the primary importance of high resolution imaging in THz radar applications for concealed weapons detection.
Director of Innovation. Volume 3, November 2009
2009-11-01
evaluated at Crimson Vi- per 2009 included the Portable Acoustic Contraband Detector (PACD) and the Fluxgate Magnetometer , two projects from SPAWAR...concealed within the containers. The Fluxgate Magnetometer is a hockey puck-sized sensor head that can detect vehicles and weapons by measuring
Millimetre wave and terahertz technology for the detection of concealed threats: a review
NASA Astrophysics Data System (ADS)
Kemp, Michael C.
2006-09-01
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.
Detection of contraband concealed on the body using x-ray imaging
NASA Astrophysics Data System (ADS)
Smith, Gerald J.
1997-01-01
In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.
Three-dimensional radar imaging techniques and systems for near-field applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Hall, Thomas E.; McMakin, Douglas L.
2016-05-12
The Pacific Northwest National Laboratory has developed three-dimensional holographic (synthetic aperture) radar imaging techniques and systems for a wide variety of near-field applications. These applications include radar cross-section (RCS) imaging, personnel screening, standoff concealed weapon detection, concealed threat detection, through-barrier imaging, ground penetrating radar (GPR), and non-destructive evaluation (NDE). Sequentially-switched linear arrays are used for many of these systems to enable high-speed data acquisition and 3-D imaging. In this paper, the techniques and systems will be described along with imaging results that demonstrate the utility of near-field 3-D radar imaging for these compelling applications.
A Practical Millimeter-Wave Holographic Imaging System with Tunable IF Attenuator
NASA Astrophysics Data System (ADS)
Zhu, Yu-Kun; Yang, Ming-Hui; Wu, Liang; Sun, Yun; Sun, Xiao-Wei
2017-10-01
A practical millimeter-wave (mmw) holographic imaging system with tunable intermediate frequency (IF) attenuator has been developed. It can be used for the detection of concealed weapons at security checkpoints, especially the airport. The system is utilized to scan the passenger and detect the weapons hidden in the clothes. To reconstruct the three dimensions (3-D) image, a holographic mmw imaging algorithm based on aperture synthesis and back scattering is presented. The system is active and works at 28-33 GHz. Tunable IF attenuator is applied to compensate the intensity and phase differences between multi-channels and multi-frequencies.
Guns on Campus: A Current Debate. E-Fact Sheet
ERIC Educational Resources Information Center
Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2010
2010-01-01
Almost all U.S. college campuses ban concealed weapons. But in the aftermath of the tragic shooting deaths at Virginia Tech in 2007, the debate on whether guns should be permitted at colleges and universities has intensified. Dozens of states have considered proposals to lift bans on concealed weapons at colleges and universities, but so far none…
Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons
NASA Astrophysics Data System (ADS)
Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.
2015-10-01
The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.
Review of terahertz technology development at INO
NASA Astrophysics Data System (ADS)
Dufour, Denis; Marchese, Linda; Terroux, Marc; Oulachgar, Hassane; Généreux, Francis; Doucet, Michel; Mercier, Luc; Tremblay, Bruno; Alain, Christine; Beaupré, Patrick; Blanchard, Nathalie; Bolduc, Martin; Chevalier, Claude; D'Amato, Dominic; Desroches, Yan; Duchesne, François; Gagnon, Lucie; Ilias, Samir; Jerominek, Hubert; Lagacé, François; Lambert, Julie; Lamontagne, Frédéric; Le Noc, Loïc; Martel, Anne; Pancrati, Ovidiu; Paultre, Jacques-Edmond; Pope, Tim; Provençal, Francis; Topart, Patrice; Vachon, Carl; Verreault, Sonia; Bergeron, Alain
2015-10-01
Over the past decade, INO has leveraged its expertise in the development of uncooled microbolometer detectors for infrared imaging to produce terahertz (THz) imaging systems. By modifying its microbolometer-based focal plane arrays to enhance absorption in the THz bands and by developing custom THz imaging lenses, INO has developed a leading-edge THz imaging system, the IRXCAM-THz-384 camera, capable of exploring novel applications in the emerging field of terahertz imaging and sensing. Using appropriate THz sources, results show that the IRXCAM-THz-384 camera is able to image a variety of concealed objects of interest for applications such as non-destructive testing and weapons detections. By using a longer wavelength (94 GHz) source, it is also capable of sensing the signatures of various objects hidden behind a drywall panel. This article, written as a review of THz research at INO over the past decade, describes the technical components that form the IRXCAM-THz-384 camera and the experimental setup used for active THz imaging. Image results for concealed weapons detection experiments, an exploration of wavelength choice on image quality, and the detection of hidden objects behind drywall are also presented.
Passive millimeter-wave imaging for concealed article detection
NASA Astrophysics Data System (ADS)
Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.
1997-02-01
Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.
Campaign for Right to Carry Concealed Guns on Campuses Gains Traction
ERIC Educational Resources Information Center
Wiseman, Rachel
2012-01-01
Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
36 CFR 520.15 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 6 2014-01-01 2014-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 6 2012-01-01 2012-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
36 CFR 520.15 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 6 2014-01-01 2014-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
15 CFR 265.39 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 6 2011-01-01 2011-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
31 CFR 91.13 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false Weapons and explosives. 91.13 Section... GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 6 2014-01-01 2014-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
15 CFR 265.39 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...
36 CFR 520.15 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 6 2013-01-01 2013-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 6 2012-01-01 2012-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
15 CFR 265.39 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 6 2011-01-01 2011-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 6 2012-01-01 2012-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
31 CFR 91.13 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false Weapons and explosives. 91.13 Section... GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 6 2013-01-01 2013-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
15 CFR 265.39 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...
31 CFR 91.13 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false Weapons and explosives. 91.13 Section... GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...
31 CFR 91.13 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false Weapons and explosives. 91.13 Section... GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...
36 CFR 520.15 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 6 2011-01-01 2011-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 6 2013-01-01 2013-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
Rezos, Mary M; Schultz, John J; Murdock, Ronald A; Smith, Stephen A
2010-02-25
Incorporating geophysical technologies into forensic investigations has become a growing practice. Oftentimes, forensic professionals rely on basic metal detectors to assist their efforts during metallic weapons searches. This has created a need for controlled research in the area of weapons searches, specifically to formulate guidelines for geophysical methods that may be appropriate for locating weapons that have been discarded or buried by criminals attempting to conceal their involvement in a crime. Controlled research allows not only for testing of geophysical equipment, but also for updating search methodologies. This research project was designed to demonstrate the utility of an all-metal detector for locating a buried metallic weapon through detecting and identifying specific types of buried metal targets. Controlled testing of 32 buried targets which represented a variety of sizes and metallic compositions included 16 decommissioned street-level firearms, 6 pieces of assorted scrap metals, and 10 blunt or bladed weapons. While all forensic targets included in the project were detected with the basic all-metal detector, the size of the weapon and surface area were the two variables that affected maximum depth of detection, particularly with the firearm sample. For example, when using a High setting the largest firearms were detected at a maximum depth of 55 cm, but the majority of the remaining targets were only detected at a maximum depth of 40 cm or less. Overall, the all-metal detector proved to be a very good general purpose metal detector best suited for detecting metallic items at shallow depths. 2009 Elsevier Ireland Ltd. All rights reserved.
Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection
NASA Astrophysics Data System (ADS)
Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.
2000-07-01
A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.
Classifying threats with a 14-MeV neutron interrogation system.
Strellis, Dan; Gozani, Tsahi
2005-01-01
SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.
36 CFR § 520.15 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Weapons and explosives. § 520... § 520.15 Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall...
New approach for detecting and classifying concealed weapons
NASA Astrophysics Data System (ADS)
Roybal, Lyle G.; Rice, Philip M.; Manhardt, Joseph M.
1997-02-01
The possession of a weapon in the courtroom of our American justice system is a Federal offense. A weapon in the courtroom is a particularly serious problem for judges, plaintiffs, defendants, and bystanders because of the emotional nature and environment of the courtroom. Potential violators include organized criminals and gangsters, individuals with personal vendettas, and otherwise sane and reasonable people who, because of the emotion of the moment, lose sight of right and wrong in our justice system. Most Federal courthouses incorporate some sort of metal detection apparatus used to screen and prevent individuals from carrying personal weapons into courtrooms. These devices are considered conventional in the sense that they employ an active electromagnetic induction technique that is sensitive to the presence of metal. This technique provides no information concerning the massiveness and location of the offending metal object and is prone to false alarms. This work introduces an alternative method for weapons discrimination that is based on passive magnetics technology in concert with simple comparative algorithms such that massiveness and location of suspected weapons may be determined. Since this system provides information not available from conventional metal detectors, false alarms will be greatly reduced, allowing remote monitoring of all entrances into a courtroom from a single vantage point, thereby saving considerable resources used on personnel costs.
Terahertz Imaging of Subjects With Concealed Weapons
2006-05-01
pulsed imaging", Advanced Characterization, Therapeutics, and Systems XIV, Proceedings of SPIE, Vol. 5318: 23-33 6. Anthony E. Siegman , Lasers , p667...imagery. Both methods made use of in-house transceivers, consisting of two ultra-stable far-infrared lasers , terahertz heterodyne detection systems...SYSTEM The 1.56THz transceiver system at STL uses two carbon dioxide lasers paired individually with two far-infrared lasers . All four units are
Three applications of backscatter x-ray imaging technology to homeland defense
NASA Astrophysics Data System (ADS)
Chalmers, Alex
2005-05-01
A brief review of backscatter x-ray imaging and a description of three systems currently applying it to homeland defense missions (BodySearch, ZBV and ZBP). These missions include detection of concealed weapons, explosives and contraband on personnel, in vehicles and large cargo containers. An overview of the x-ray imaging subsystems is provided as well as sample images from each system. Key features such as x-ray safety, throughput and detection are discussed. Recent trends in operational modes are described that facilitate 100% inspection at high throughput chokepoints.
Development of a High-Throughput Microwave Imaging System for Concealed Weapons Detection
2016-07-15
hardware. Index Terms—Microwave imaging, multistatic radar, Fast Fourier Transform (FFT). I. INTRODUCTION Near-field microwave imaging is a non-ionizing...configuration, but its computational demands are extreme. Fast Fourier Transform (FFT) imaging has long been used to efficiently construct images sampled with...Simulated image of 25 point scatterers imaged at range 1.5m, with array layout depicted in Fig. 3. Left: image formed with Equation (5) ( Fourier
Ethics and Leadership: Integration or Disharmony
2013-03-01
recent studies confirm that chemical, biological and several varieties of remote weapons could also become much more deadly and easier to conceal...include the expansion of terrorism and guerrilla warfare, the use of new weapons , new forms of political associations, and new moral and political...specific weapons , but, as with many aspects of the law, existing standards are inadequate for contemporary technologies and circumstances.൸
Millimeter wave imaging for concealed weapon detection and surveillance at up to 220 GHz
NASA Astrophysics Data System (ADS)
Stanko, S.; Nötel, D.; Huck, J.; Wirtz, S.; Klöppel, F.; Essen, H.
2008-04-01
Sensors used for security purposes have to cover the non-invasive control of men and direct surroundings of buildings and camps to detect weapons, explosives and chemical or biological threat material. Those sensors have to cope with different environmental conditions. Ideally, the control of people has to be done at a longer distance as standoff detection. The work described in this paper concentrates on passive radiometric sensors at 0.1 and 0.2 THz which are able to detect non-metallic objects like ceramic knifes. Also the identification of objects like mobile phones or PDAs will be shown. Additionally, standoff surveillance is possible, which is of high importance with regard to suicide bombers. The presentation will include images at both mentioned frequencies comparing the efficiency in terms of range and resolution. In addition, the concept of the sensor design showing a Dicke-type 220GHz radiometer using new LNAs and the results along with image enhancement methods are shown. 2.1 Main principle
TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks
NASA Astrophysics Data System (ADS)
Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree
2014-06-01
The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.
Foliage penetration by using 4-D point cloud data
NASA Astrophysics Data System (ADS)
Méndez Rodríguez, Javier; Sánchez-Reyes, Pedro J.; Cruz-Rivera, Sol M.
2012-06-01
Real-time awareness and rapid target detection are critical for the success of military missions. New technologies capable of detecting targets concealed in forest areas are needed in order to track and identify possible threats. Currently, LAser Detection And Ranging (LADAR) systems are capable of detecting obscured targets; however, tracking capabilities are severely limited. Now, a new LADAR-derived technology is under development to generate 4-D datasets (3-D video in a point cloud format). As such, there is a new need for algorithms that are able to process data in real time. We propose an algorithm capable of removing vegetation and other objects that may obfuscate concealed targets in a real 3-D environment. The algorithm is based on wavelets and can be used as a pre-processing step in a target recognition algorithm. Applications of the algorithm in a real-time 3-D system could help make pilots aware of high risk hidden targets such as tanks and weapons, among others. We will be using a 4-D simulated point cloud data to demonstrate the capabilities of our algorithm.
15 CFR 742.9 - Anti-terrorism: Syria.
Code of Federal Regulations, 2014 CFR
2014-01-01
... will generally be denied: (i) Items that are controlled for chemical and biological weapons... fertilizers containing ammonium nitrate, controlled under ECCN 1C997. (xi) Technology for the production of Chemical Weapons Convention (CWC) Schedule 2 and 3 chemicals controlled under ECCN 1E355. (xii) Concealed...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
Veteran Transfer Students and Concealed Weapons on Campus
ERIC Educational Resources Information Center
Pesetski, Christine; Ofstein, Jennifer; Outlaw, Stacy; Brooks, Racheal
2014-01-01
This case details the challenges faced by various members of a 4-year university regarding Kathryn, a non-traditional transfer student and military veteran who recently returned from a traumatic deployment in Afghanistan. Precisely, this study identifies ambiguities pertaining to (a) threat assessment, (b) university weapons policies, (c) transfer…
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
Non-Linear Acoustic Concealed Weapons Detector
2006-05-01
signature analysis 8 the interactions of the beams with concealed objects. The Khokhlov- Zabolotskaya-Kuznetsov ( KZK ) equation is the most widely used...Hamilton developed a finite difference method based on the KZK equation to model pulsed acoustic emissions from axial symmetric sources. Using a...College of William & Mary, we have developed a simulation code using the KZK equation to model non-linear acoustic beams and visualize beam patterns
Campaigns to Overrule Campus Gun Bans Have Failed in Many States
ERIC Educational Resources Information Center
Lipka, Sara
2008-01-01
People can bring guns most places in Arizona, but the state's Board of Regents has long banned all weapons from public college campuses. Now some lawmakers are trying to change that. State Senator Karen S. Johnson, a Republican, proposed a bill in January that would trump the regents' ban, allowing anyone with a concealed-weapons permit to carry a…
Target recognition in passive terahertz image of human body
NASA Astrophysics Data System (ADS)
Zhao, Ran; Zhao, Yuan-meng; Deng, Chao; Zhang, Cun-lin; Li, Yue
2014-11-01
THz radiation can penetrate through many nonpolar dielectric materials and can be used for nondestructive/noninvasive sensing and imaging of targets under nonpolar, nonmetallic covers or containers. Thus using THz systems to "see through" concealing barriers (i.e. packaging, corrugated cardboard, clothing) has been proposed as a new security screening method. Objects that can be detected by THz include concealed weapons, explosives, and chemical agents under clothing. Passive THz imaging system can detect THz wave from human body without transmit any electromagnetic wave, and the suspicious objects will become visible because the THz wave is blocked by this items. We can find out whether or not someone is carrying dangerous objects through this image. In this paper, the THz image enhancement, segmentation and contour extraction algorithms were studied to achieve effective target image detection. First, the terahertz images are enhanced and their grayscales are stretched. Then we apply global threshold segmentation to extract the target, and finally the targets are marked on the image. Experimental results showed that the algorithm proposed in this paper can extract and mark targets effectively, so that people can identify suspicious objects under clothing quickly. The algorithm can significantly improve the usefulness of the terahertz security apparatus.
Detection of hidden objects using a real-time 3-D millimeter-wave imaging system
NASA Astrophysics Data System (ADS)
Rozban, Daniel; Aharon, Avihai; Levanon, Assaf; Abramovich, Amir; Yitzhaky, Yitzhak; Kopeika, N. S.
2014-10-01
Millimeter (mm)and sub-mm wavelengths or terahertz (THz) band have several properties that motivate their use in imaging for security applications such as recognition of hidden objects, dangerous materials, aerosols, imaging through walls as in hostage situations, and also in bad weather conditions. There is no known ionization hazard for biological tissue, and atmospheric degradation of THz radiation is relatively low for practical imaging distances. We recently developed a new technology for the detection of THz radiation. This technology is based on very inexpensive plasma neon indicator lamps, also known as Glow Discharge Detector (GDD), that can be used as very sensitive THz radiation detectors. Using them, we designed and constructed a Focal Plane Array (FPA) and obtained recognizable2-dimensional THz images of both dielectric and metallic objects. Using THz wave it is shown here that even concealed weapons made of dielectric material can be detected. An example is an image of a knife concealed inside a leather bag and also under heavy clothing. Three-dimensional imaging using radar methods can enhance those images since it can allow the isolation of the concealed objects from the body and environmental clutter such as nearby furniture or other people. The GDDs enable direct heterodyning between the electric field of the target signal and the reference signal eliminating the requirement for expensive mixers, sources, and Low Noise Amplifiers (LNAs).We expanded the ability of the FPA so that we are able to obtain recognizable 2-dimensional THz images in real time. We show here that the THz detection of objects in three dimensions, using FMCW principles is also applicable in real time. This imaging system is also shown here to be capable of imaging objects from distances allowing standoff detection of suspicious objects and humans from large distances.
Noise analysis for near-field 3D FM-CW radar imaging systems
NASA Astrophysics Data System (ADS)
Sheen, David M.
2015-05-01
Near field radar imaging systems are used for demanding security applications including concealed weapon detection in airports and other high-security venues. Despite the near-field operation, phase noise and thermal noise can limit performance in several ways. Practical imaging systems can employ arrays with low gain antennas and relatively large signal distribution networks that have substantial losses which limit transmit power and increase the effective noise figure of the receiver chain, resulting in substantial thermal noise. Phase noise can also limit system performance. The signal coupled from transmitter to receiver is much larger than expected target signals. Phase noise from this coupled signal can set the system noise floor if the oscillator is too noisy. Frequency modulated continuous wave (FM-CW) radar transceivers used in short range systems are relatively immune to the effects of the coupled phase noise due to range correlation effects. This effect can reduce the phase-noise floor such that it is below the thermal noise floor for moderate performance oscillators. Phase noise is also manifested in the range response around bright targets, and can cause smaller targets to be obscured. Noise in synthetic aperture imaging systems is mitigated by the processing gain of the system. In this paper, the effects of thermal noise, phase noise, and processing gain are analyzed in the context of a near field 3-D FM-CW imaging radar as might be used for concealed weapon detection. In addition to traditional frequency domain analysis, a time-domain simulation is employed to graphically demonstrate the effect of these noise sources on a fast-chirping FM-CW system.
2016-06-01
media sources on the public discourse. This research compares and contrasts the roles and importance of traditional and social media in the public...alternative media , social media 15. NUMBER OF PAGES 73 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...importance of traditional and social media in the public sphere today, as evidenced by the coverage of concealed-carry laws and related stories. The
NASA Astrophysics Data System (ADS)
Murrill, Steven R.; Jacobs, Eddie L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.
2015-10-01
The U.S. Army Research Laboratory (ARL) has continued to develop and enhance a millimeter-wave (MMW) and submillimeter- wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry, and for pilotage obstacle avoidance. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). Further development of this tool that includes a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures was reported on at the 2011 SPIE Europe Security and Defence Symposium (Prague). This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise sub-model for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination- based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
ERIC Educational Resources Information Center
Fennell, Reginald
2009-01-01
Crimes on college campuses can "strike fear" into the lives of those in higher education and a shooting is one of the crimes that ranks at the top of the most feared acts of violence. Maybe more direct counseling for clients who have weapons with regard to anticipatory guidance on firearms is needed. However, the debate continues with proposed…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Fernandes, Justin L.; Tedeschi, Jonathan R.
2013-06-12
Active millimeter-wave imaging is currently being used for personnel screening at airports and other high-security facilities. The lateral resolution, depth resolution, clothing penetration, and image illumination quality obtained from next-generation systems can be significantly enhanced through the selection the aperture size, antenna beamwidth, center frequency, and bandwidth. In this paper, the results of an extensive imaging trade study are presented using both planar and cylindrical three-dimensional imaging techniques at frequency ranges of 10-20 GHz, 10 – 40 GHz, 40 – 60 GHz, and 75 – 105 GHz
Method and apparatus for detecting concealed weapons
Kotter, Dale K.; Fluck, Frederick D.
2006-03-14
Apparatus for classifying a ferromagnetic object within a sensing area may include a magnetic field sensor that produces magnetic field data. A signal processing system operatively associated with the magnetic field sensor includes a neural network. The neural network compares the magnetic field data with magnetic field data produced by known ferromagnetic objects to make a probabilistic determination as to the classification of the ferromagnetic object within the sensing area. A user interface operatively associated with the signal processing system produces a user-discernable output indicative of the probabilistic determination of the classification of the ferromagnetic object within a sensing area.
Near-field three-dimensional radar imaging techniques and applications.
Sheen, David; McMakin, Douglas; Hall, Thomas
2010-07-01
Three-dimensional radio frequency imaging techniques have been developed for a variety of near-field applications, including radar cross-section imaging, concealed weapon detection, ground penetrating radar imaging, through-barrier imaging, and nondestructive evaluation. These methods employ active radar transceivers that operate at various frequency ranges covering a wide range, from less than 100 MHz to in excess of 350 GHz, with the frequency range customized for each application. Computational wavefront reconstruction imaging techniques have been developed that optimize the resolution and illumination quality of the images. In this paper, rectilinear and cylindrical three-dimensional imaging techniques are described along with several application results.
NASA Astrophysics Data System (ADS)
Waldman, Jerry; Danylov, Andriy A.; Goyette, Thomas M.; Coulombe, Michael J.; Giles, Robert H.; Gatesman, Andrew J.; Goodhue, William D.; Li, Jin; Linden, Kurt J.; Nixon, William E.
2009-02-01
Coherent terahertz radar systems, using CO2 laser-pumped molecular lasers have been used during the past decade for radar scale modeling applications, as well as proof-of-principle demonstrations of remote detection of concealed weapons. The presentation will consider the potential for replacement of molecular laser sources by quantum cascade lasers. While the temporal and spatial characteristics of current THz QCLs limit their applicability, rapid progress is being made in resolving these issues. Specifications for satisfying the requirements of coherent short-range THz radars will be reviewed and the feasibility of incorporating existing QCL devices into such systems will be described.
2005-01-01
Nations Observer Badges, Defense Intelligence Agency identification, and a Federal Concealed Weapons Permit—to Edward Feltus , a member of the New...federal weap- ons charges, and in May 2004 were sentenced to 135 months and 57 months in federal custody, respectively. Feltus pled guilty to
FY71 Engineering Report on Surveillance Techniques for Civil Aviation Security
DOT National Transportation Integrated Search
1971-11-01
This document discusses the work performed by the TSC task group on surveillance techniques in FY71. The principal section is devoted to the technical description, classification and evaluation of commercial metal detectors for concealed weapons. It ...
Technical Evaluation of Metal Detectors for Concealed Weapons (Supplement 1)
DOT National Transportation Integrated Search
1972-04-01
This document augments the classification and technical evaluation of Commercial Metal Detectors presented in Report No. DOT-TSC-OST-71-15, June 1971. Data based on extensive laboratory tests are presented on two hand-held models and two walk-through...
Wavelet Fusion for Concealed Object Detection Using Passive Millimeter Wave Sequence Images
NASA Astrophysics Data System (ADS)
Chen, Y.; Pang, L.; Liu, H.; Xu, X.
2018-04-01
PMMW imaging system can create interpretable imagery on the objects concealed under clothing, which gives the great advantage to the security check system. Paper addresses wavelet fusion to detect concealed objects using passive millimeter wave (PMMW) sequence images. According to PMMW real-time imager acquired image characteristics and storage methods firstly, using the sum of squared difference (SSD) as the image-related parameters to screen the sequence images. Secondly, the selected images are optimized using wavelet fusion algorithm. Finally, the concealed objects are detected by mean filter, threshold segmentation and edge detection. The experimental results show that this method improves the detection effect of concealed objects by selecting the most relevant images from PMMW sequence images and using wavelet fusion to enhance the information of the concealed objects. The method can be effectively applied to human body concealed object detection in millimeter wave video.
A simulation study of detection of weapon of mass destruction based on radar
NASA Astrophysics Data System (ADS)
Sharifahmadian, E.; Choi, Y.; Latifi, S.
2013-05-01
Typical systems used for detection of Weapon of Mass Destruction (WMD) are based on sensing objects using gamma rays or neutrons. Nonetheless, depending on environmental conditions, current methods for detecting fissile materials have limited distance of effectiveness. Moreover, radiation related to gamma- rays can be easily shielded. Here, detecting concealed WMD from a distance is simulated and studied based on radar, especially WideBand (WB) technology. The WB-based method capitalizes on the fact that electromagnetic waves penetrate through different materials at different rates. While low-frequency waves can pass through objects more easily, high-frequency waves have a higher rate of absorption by objects, making the object recognition easier. Measuring the penetration depth allows one to identify the sensed material. During simulation, radar waves and propagation area including free space, and objects in the scene are modeled. In fact, each material is modeled as a layer with a certain thickness. At start of simulation, a modeled radar wave is radiated toward the layers. At the receiver side, based on the received signals from every layer, each layer can be identified. When an electromagnetic wave passes through an object, the wave's power will be subject to a certain level of attenuation depending of the object's characteristics. Simulation is performed using radar signals with different frequencies (ranges MHz-GHz) and powers to identify different layers.
Contemporary Responses to Violent Attacks on College Campuses
ERIC Educational Resources Information Center
Sulkowski, Michael L.; Lazarus, Philip J.
2011-01-01
In this article, the authors review efforts to increase the availability of crime data to students and parents, utilize security technologies on campus, allow members of campus communities to carry concealed weapons, use criminal or potential shooter profiling, employ threat assessment techniques, and implement emergency response plans to address…
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any... of Security or his designee at each Agency facility. The use of chemical agents (Mace, tear gas, etc.) on protected property in circumstances that do not include an immediate and unlawful threat of...
Okaying the Use of Metal Detectors Proves Easier than Actually Using Them.
ERIC Educational Resources Information Center
Stelly, Philip
1984-01-01
Discusses legal problems of a policy permitting the use of metal detectors to search students suspected of carrying concealed weapons. A wholesale search policy was challenged as a violation of students' rights, so the board adopted a selective search policy based on reasonable suspicion. (TE)
Decision-Making Processes in Texas School Districts That Arm Personnel
ERIC Educational Resources Information Center
Domain, Melinda Willoughby
2014-01-01
This qualitative phenomenological study employed narrative inquiry to describe the decision-making processes that Texas school districts followed in enacting firearms policies that allow school employees to carry concealed weapons on district property. Exploration of the lived experiences of eight Texas superintendents in such schools contributed…
32 CFR 552.103 - Requirements for carrying and use.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and return. Stopping at other installation facilities while enroute is prohibited (i.e., Post Exchange..., weapons will be carried in an open manner (not concealed). Firearms will be unloaded when carried (i.e... readily accessible from the passenger area (i.e., locked tool box secured to bed of a truck). Firearms...
High-resolution three-dimensional imaging radar
NASA Technical Reports Server (NTRS)
Cooper, Ken B. (Inventor); Chattopadhyay, Goutam (Inventor); Siegel, Peter H. (Inventor); Dengler, Robert J. (Inventor); Schlecht, Erich T. (Inventor); Mehdi, Imran (Inventor); Skalare, Anders J. (Inventor)
2010-01-01
A three-dimensional imaging radar operating at high frequency e.g., 670 GHz, is disclosed. The active target illumination inherent in radar solves the problem of low signal power and narrow-band detection by using submillimeter heterodyne mixer receivers. A submillimeter imaging radar may use low phase-noise synthesizers and a fast chirper to generate a frequency-modulated continuous-wave (FMCW) waveform. Three-dimensional images are generated through range information derived for each pixel scanned over a target. A peak finding algorithm may be used in processing for each pixel to differentiate material layers of the target. Improved focusing is achieved through a compensation signal sampled from a point source calibration target and applied to received signals from active targets prior to FFT-based range compression to extract and display high-resolution target images. Such an imaging radar has particular application in detecting concealed weapons or contraband.
Terahertz technology for imaging and spectroscopy
NASA Astrophysics Data System (ADS)
Crowe, T. W.; Porterfield, D. W.; Hesler, J. L.; Bishop, W. L.; Kurtz, D. S.; Hui, K.
2006-05-01
The terahertz region of the electromagnetic spectrum has unique properties that make it especially useful for imaging and spectroscopic detection of concealed weapons, explosives and chemical and biological materials. However, terahertz energy is difficult to generate and detect, and this has led to a technology gap in this frequency band. Nonlinear diodes can be used to bridge this gap by translating the functionality achieved at microwave frequencies to the terahertz band. Basic building blocks include low-noise mixers, frequency multipliers, sideband generators and direct detectors. These terahertz components rely on planar Schottky diodes and recently developed integrated diode circuits make them easier to assemble and more robust. The new generation of terahertz sources and receivers requires no mechanical tuning, yet achieves high efficiency and broad bandwidth. This paper reviews the basic design of terahertz transmitters and receivers, with special emphasis on the recent development of systems that are compact, easy to use and have excellent performance.
Guns Don't Belong in the Hands of Administrators, Professors, or Students
ERIC Educational Resources Information Center
Villahermosa, Jesus M., Jr.
2008-01-01
In the wake of the shootings at Virginia Tech and Northern Illinois University, a number of state legislatures are considering bills that would allow people to carry concealed weapons on college campuses. The author recently spoke at a conference on higher-education law, sponsored by Stetson University and the National Association of Student…
Teachers Already Armed in Some Districts
ERIC Educational Resources Information Center
Shah, Nirvi
2013-01-01
Shooting instructor Johnny Price looked at the teachers lined up in front of him. Mr. Price, the owner of Big Iron Concealed Handgun Training in Waco, Texas, spent two days this month training teachers and staff members from the Clifton school district in all they need to know to earn licenses to carry weapons out of sight. There is no indication…
Sparse interferometric millimeter-wave array for centimeter-level 100-m standoff imaging
NASA Astrophysics Data System (ADS)
Suen, Jonathan Y.; Lubin, Philip M.; Solomon, Steven L.; Ginn, Robert P.
2013-05-01
We present work on the development of a long range standoff concealed weapons detection system capable of imaging under very heavy clothing at distances exceeding 100 m with a cm resolution. The system is based off a combination of phased array technologies used in radio astronomy and SAR radar by using a coherent, multi-frequency reconstruction algorithm which can run at up to 1000 Hz frame rates and high SNR with a multi-tone transceiver. We show the flexible design space of our system as well as algorithm development, predicted system performance and impairments, and simulated reconstructed images. The system can be used for a variety of purposes including portal applications, crowd scanning and tactical situations. Additional uses include seeing through dust and fog.
Legislative Review. A Look at Higher Education in Week 10: March 9-13, 2009
ERIC Educational Resources Information Center
North Dakota University System, 2009
2009-01-01
This issue of "Legislative Review" takes a look at the news in higher education from March 9 to 13, 2009. It reports that this week: (1) HB 1348, a bill that would permit the carrying of concealed weapons at North Dakota University System (NDUS) campus student apartments, was heard in the Senate Government and Veterans Affairs Committee…
Legislative Review. A Look at Higher Education in Week 6: February 9-13, 2009
ERIC Educational Resources Information Center
North Dakota University System, 2009
2009-01-01
This issue of "Legislative Review" takes a look at the news in higher education from February 9 to 13, 2009. This Legislative Review reports that: (1) the House Government and Veterans Affairs Committee acted on HB 1348, the concealed weapons bill, Friday, February 13. The House will consider the proposed amendment and vote on the bill,…
Legislative Review. A Look at Higher Education in Week 4: January 26-30, 2009
ERIC Educational Resources Information Center
North Dakota University System, 2009
2009-01-01
This Legislative Review reports that: (1) HB 1348, a bill to permit concealed weapons at public events and places, including North Dakota University System (NDUS) campuses, was heard in the House Government and Veterans Affairs Committee Friday, January 30. The State Board of Higher Education (SBHE) opposes this bill unless it is amended to…
Arming the Academy: How Carry-on-Campus Impact Incidence of Reported Sexual Assault Crimes
ERIC Educational Resources Information Center
Biastro, Leslie A.; Larwin, Karen H.; Carano, Marla E.
2017-01-01
Discussions have recently intensified regarding how to curtail the disturbingly high amount of sexual assaults that occur each year on U.S. College and university campuses. One suggestion to assist in the reduction of these crimes would be to allow students to carry concealed weapons as a means of self-protection. Considering the current culture…
NASA Astrophysics Data System (ADS)
Morgan, John S.
2005-05-01
Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.
Standoff passive video imaging at 350 GHz with 251 superconducting detectors
NASA Astrophysics Data System (ADS)
Becker, Daniel; Gentry, Cale; Smirnov, Ilya; Ade, Peter; Beall, James; Cho, Hsiao-Mei; Dicker, Simon; Duncan, William; Halpern, Mark; Hilton, Gene; Irwin, Kent; Li, Dale; Paulter, Nicholas; Reintsema, Carl; Schwall, Robert; Tucker, Carole
2014-06-01
Millimeter wavelength radiation holds promise for detection of security threats at a distance, including suicide bomb belts and maritime threats in poor weather. The high sensitivity of superconducting Transition Edge Sensor (TES) detectors makes them ideal for passive imaging of thermal signals at these wavelengths. We have built a 350 GHz video-rate imaging system using a large-format array of feedhorn-coupled TES bolometers. The system operates at a standoff distance of 16m to 28m with a spatial resolution of 1:4 cm (at 17m). It currently contains one 251-detector subarray, and will be expanded to contain four subarrays for a total of 1004 detectors. The system has been used to take video images which reveal the presence of weapons concealed beneath a shirt in an indoor setting. We present a summary of this work.
NASA Astrophysics Data System (ADS)
Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.
2011-11-01
The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.
Army Synthetic Validity Project Report of Phase 2 Results. Volume 3. Research Instruments
1990-10-01
Areas 7. The type of secondary arms room lock shown at A in the diagram below requires rotation A. monthly B. quarterly C. semiannually D. annually E...building concrete, stone, or other structures (for example, roads, fortifications , buildings, etc.). 16. Operate wheeled vehicles - drive wheeled...for cover and concealment and to place weapons, fortifications , mines, and detectors. 64. Translate foreign languages - translate written or spoken
Virtual Prototyping: Concept to Production
1994-03-01
element analysis. Meshing refers to the gen - following page. The FEA enables designers to eration of nodal coordinates and elements evaluate complex...pants. It is not acceptable to have one weapon technology. This is especially true when gen - system believe it is concealed by a terrain fea- erating...conducted by Gen - process there is ample opportunity to utilize eral Paul F Gorman, USA (Ret.), who led the virtual prototyping and simulation to en
Status of VESAS: a fully-electronic microwave imaging radiometer system
NASA Astrophysics Data System (ADS)
Schreiber, Eric; Peichl, Markus; Suess, Helmut
2010-04-01
Present applications of microwave remote sensing systems cover a large variety. One utilisation of the frequency range from 1 - 300 GHz is the domain of security and reconnaissance. Examples are the observation of critical infrastructures or the performance of security checks on people in order to detect concealed weapons or explosives, both being frequent threats in our world of growing international terrorism. The imaging capability of concealed objects is one of the main advantages of microwave remote sensing, because of the penetration performance of electromagnetic waves through dielectric materials in this frequency domain. The main physical effects used in passive microwave sensing rely on the naturally generated thermal radiation and the physical properties of matter, the latter being surface characteristics, chemical and physical composition, and the temperature of the material. As a consequence it is possible to discriminate objects having different material characteristics like ceramic weapons or plastic explosives with respect to the human body. Considering the use of microwave imaging with respect to people scanning systems in airports, railway stations, or stadiums, it is advantageous that passively operating devices generate no exposure on the scanned objects like actively operating devices do. For frequently used security gateways it is additionally important to have a high through-put rate in order to minimize the queue time. Consequently fast imaging systems are necessary. In this regard the conceptual idea of a fully-electronic microwave imaging radiometer system is introduced. The two-dimensional scanning mechanism is divided into a frequency scan in one direction and the method of aperture synthesis in the other. The overall goal here is to design a low-cost, fully-electronic imaging system with a frame rate of around one second at Ka band. This frequency domain around a center frequency of 37 GHz offers a well-balanced compromise between the achievable spatial resolution for a given size, and the penetration depth of the electromagnetic wave, which are conflictive requirements.
Mitigating the Backlash: US Airpower as a Military Instrument of Policy
2003-06-01
maintain their preeminence by employing strategies based more on benevolence than coercion.”31 This is a key point , as it marks a line of departure...weapons are easily defeated with smoke or fire in the target area (to defeat laser designators and thermal imaging), by adequate concealment and...create decoy surface-to-air missiles (SAMs) and radars, some quite sophisticated, and to employ previously “strategic” (immobile, point -defense
East Europe Report: Political, Sociological and Military Affairs, No. 2194
1983-09-07
dropping its grey veil. A sparkling starry sky and pale moonlight promise a cold night. With their weapons at the ready, concealed by tree trunks...that the realization and preparation of films on contemporary themes is occasionally more difficult than that of films examining other times. It was...Sports Hall, the Round Hall, and :the National Stadium./ Photographic, industrial, folklore and fine artists, and film and theater studios can show
Detection of a concealed object
Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA
2010-11-16
Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.
Detection of a concealed object
Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA
2008-04-29
Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.
Hard x-ray focusing optics for concealed object detection
NASA Astrophysics Data System (ADS)
Jannson, Tomasz; Gertsenshteyn, Michael
2006-05-01
In this paper, we discuss hard x-ray optics, in general, and lobster-eye focusing optics, in particular, for concealed object detection, at longer distances. The longer distance (~50m) scenario is important for Improvised Explosives Detection (IED), "seeing through walls," "seeing objects under ground," and related applications.
The use of far infra-red radiation for the detection of concealed metal objects
DOT National Transportation Integrated Search
1971-11-01
The use of infrared radiation for the detection of concealed metal objects has been investigated both theoretically and experimentally. The investigation was divided into two phases, one which considered passive techniques, and another which involved...
The use of far infra-red radiation for the detection of concealed metal objects.
DOT National Transportation Integrated Search
1971-11-01
Abstract The use of infrared radiation for the detection : of concealed metal objects has been investigated both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and anoth...
Method for imaging a concealed object
Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID
2007-07-03
A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.
A non-imaging polarized terahertz passive system for detecting and identifying concealed explosives
NASA Astrophysics Data System (ADS)
Karam, Mostafa A.; Meyer, Doug
2011-06-01
Existing terahertz THz systems for detecting concealed explosives are not capable of identifying explosive type which leads to higher false alarm rates. Moreover, some of those systems are imaging systems that invade personal privacy, and require more processing and computational resources. Other systems have no polarization preference which makes them incapable of capturing the geometric features of an explosive. In this study a non-imaging polarized THz passive system for detecting and identifying concealed explosives overcoming the forgoing shortcomings is developed. The system employs a polarized passive THz sensor in acquiring emitted data from a scene that may have concealed explosives. The acquired data are decomposed into their natural resonance frequencies, and the number of those frequencies is used as criteria in detecting the explosive presence. If the presence of an explosive is confirmed, a set of physically based retrieval algorithms is used in extracting the explosive dielectric constant/refractive index value from natural resonance frequencies and amplitudes of associated signals. Comparing the refractive index value against a database of refractive indexes of known explosives identifies the explosive type. As an application, a system having a dual polarized radiometer operating within the frequency band of 0.62- 0.82 THz is presented and used in detecting and identifying person borne C-4 explosive concealed under a cotton garment. The system showed higher efficiencies in detecting and identifying the explosive.
Drug concealment in custody deaths--two cases.
Busuttil, A
1994-06-01
Internal concealment of drugs of abuse is a well established method of transporting such substances to avoid detection while they are being smuggled across international frontier lines.(1,2) The same method has been used by dealers and 'pushers' in between purchases on their selling rounds to avoid detection by the police. These methods of hiding drugs may be used by persons taken into short-term custody, in their belief that potential withdrawal effects would thus be avoided by continued availability of their drugs. Two cases are reported in which such concealment was discovered at autopsy after death had occurred while in police custody. In one case the drug concealed was dihydrocodeine and was directly responsible for the death.
The use of far infra-red radiation for the detection of concealed metal objects.
DOT National Transportation Integrated Search
1971-11-01
The use of infra-red radiation for the detection : of conceal ed metal objects has been investiga ted both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and another whi...
Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William
2016-11-01
In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging environment that can strengthen future evidence based guidelines. Systematic review, level III.
Induction detection of concealed bulk banknotes
NASA Astrophysics Data System (ADS)
Fuller, Christopher; Chen, Antao
2012-06-01
The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.
Capability of long distance 100 GHz FMCW using a single GDD lamp sensor.
Levanon, Assaf; Rozban, Daniel; Aharon Akram, Avihai; Kopeika, Natan S; Yitzhaky, Yitzhak; Abramovich, Amir
2014-12-20
Millimeter wave (MMW)-based imaging systems are required for applications in medicine, homeland security, concealed weapon detection, and space technology. The lack of inexpensive room temperature imaging sensors makes it difficult to provide a suitable MMW system for many of the above applications. A 3D MMW imaging system based on chirp radar was studied previously using a scanning imaging system of a single detector. The radar system requires that the millimeter wave detector will be able to operate as a heterodyne detector. Since the source of radiation is a frequency modulated continuous wave (FMCW), the detected signal as a result of heterodyne detection gives the object's depth information according to value of difference frequency, in addition to the reflectance of the 2D image. New experiments show the capability of long distance FMCW detection by using a large scale Cassegrain projection system, described first (to our knowledge) in this paper. The system presents the capability to employ a long distance of at least 20 m with a low-cost plasma-based glow discharge detector (GDD) focal plane array (FPA). Each point on the object corresponds to a point in the image and includes the distance information. This will enable relatively inexpensive 3D MMW imaging.
Automated Human Screening for Detecting Concealed Knowledge
ERIC Educational Resources Information Center
Twyman, Nathan W.
2012-01-01
Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…
Concealed wire tracing apparatus
Kronberg, J.W.
1994-05-31
An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.
2004-08-05
KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
NASA Technical Reports Server (NTRS)
2004-01-01
KENNEDY SPACE CENTER, FLA. At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASAs Federal Law Enforcement Training Academys firing range has been upgraded to include a rifle-grade shoot house, a portable, tactical shoot-back trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, pistol-grade shoot house, obstacle course and rappel tower. NASAs Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Potential for detection of explosive and biological hazards with electronic terahertz systems.
Choi, Min Ki; Bettermann, Alan; van der Weide, D W
2004-02-15
The terahertz (THz) regime (0.1-10 THz) is rich with emerging possibilities in sensing, imaging and communications, with unique applications to screening for weapons, explosives and biohazards, imaging of concealed objects, water content and skin. Here we present initial surveys to evaluate the possibility of sensing plastic explosives and bacterial spores using field-deployable electronic THz techniques based on short-pulse generation and coherent detection using nonlinear transmission lines and diode sampling bridges. We also review the barriers and approaches to achieving greater sensing-at-a-distance (stand-off) capabilities for THz sensing systems. We have made several reflection measurements of metallic and non-metallic targets in our laboratory, and have observed high contrast relative to reflection from skin. In particular, we have taken small quantities of energetic materials such as plastic explosives and a variety of Bacillus spores, and measured them in transmission and in reflection using a broadband pulsed electronic THz reflectometer. The pattern of reflection versus frequency gives rise to signatures that are remarkably specific to the composition of the target, even though the target's morphology and position is varied. Although more work needs to be done to reduce the effects of standing waves through time-gating or attenuators, the possibility of mapping out this contrast for imaging and detection is very attractive.
GaN-based THz advanced quantum cascade lasers for manned and unmanned systems
NASA Astrophysics Data System (ADS)
Anwar, A. F. M.; Manzur, Tariq; Lefebvre, Kevin R.; Carapezza, Edward M.
2009-09-01
In recent years the use of Unmanned Autonomous Vehicles (UAV) has seen a wider range of applications. However, their applications are restricted due to (a) advanced integrated sensing and processing electronics and (b) limited energy storage or on-board energy generation to name a few. The availability of a wide variety of sensing elements, operating at room temperatures, provides a great degree of flexibility with an extended application domain. Though sensors responding to a variable spectrum of input excitations ranging from (a) chemical, (b) biological, (c) atmospheric, (d) magnetic and (e) visual/IR imaging have been implemented in UAVs, the use of THz as a technology has not been implemented due to the absence of systems operating at room temperature. The integration of multi-phenomenological onboard sensors on small and miniature unmanned air vehicles will dramatically impact the detection and processing of challenging targets, such as humans carrying weapons or wearing suicide bomb vests. Unmanned air vehicles have the potential of flying over crowds of people and quickly discriminating non-threat humans from treat humans. The state of the art in small and miniature UAV's has progressed to vehicles of less than 1 pound in weight but with payloads of only a fraction of a pound. Uncooled IR sensors, such as amorphous silicon and vanadium oxide microbolometers with MRT's of less than 70mK and requiring power of less than 250mW, are available for integration into small UAV's. These sensors are responsive only up to approximately 14 microns and do not favorably compare with THz imaging systems for remotely detecting and classifying concealed weapons and bombs. In the following we propose the use of THz GaN-based QCL operating at room temperature as a possible alternative.
Weapons Retrieved After the Implementation of Emergency Department Metal Detection.
Malka, S Terez; Chisholm, Robin; Doehring, Marla; Chisholm, Carey
2015-09-01
Several high-profile violent incidents have occurred within emergency departments (EDs). There are no recent studies reporting the effectiveness of ED metal detection. Our aim was to assess the effect of metal detection on ED weapons retrieval. In September 2011, a metal detector was installed at the entrance of an urban, high-volume teaching hospital ED. The security company recorded retrieved firearms, knives, chemical sprays, and other weapons. We performed qualitative analysis of weapons retrieval data for a 26-month period. A total of 5877 weapons were retrieved, an average of 218 per month: 268 firearms, 4842 knives, 512 chemical sprays, and 275 other weapons, such as brass knuckles, stun guns, and box cutters. The number of retrieved guns decreased from 2012 to 2013 (from 182 to 47), despite an increase in metal detection hours from 8 h per day to 16 h per day. The number of retrieved knives, chemical sprays, and other weapons increased. Recovered knives increased from 2062 in 2012 to 2222 in 2013, chemical sprays increased from 170 to 305, and other weapons increased from 51 to 201. A large number of weapons were retrieved after the initiation of metal detection in the ED entrance. Increasing hours of metal detection increased the number of retrieved knives, chemical sprays, and other weapons. Retrieved firearms decreased after increasing metal detection hours. Metal detection in the ED entrance is effective in reducing entrance of weapons into the ED. Metal detectors may offer additional benefit in reducing attempts to enter with firearms. Copyright © 2015 Elsevier Inc. All rights reserved.
Optical bullet-tracking algorithms for weapon localization in urban environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roberts, R S; Breitfeller, E F
2006-03-31
Localization of the sources of small-arms fire, mortars, and rocket propelled grenades is an important problem in urban combat. Weapons of this type produce characteristic signatures, such as muzzle flashes, that are visible in the infrared. Indeed, several systems have been developed that exploit the infrared signature of muzzle flash to locate the positions of shooters. However, systems based on muzzle flash alone can have difficulty localizing weapons if the muzzle flash is obscured or suppressed. Moreover, optical clutter can be problematic to systems that rely on muzzle flash alone. Lawrence Livermore National Laboratory (LLNL) has developed a projectile trackingmore » system that detects and localizes sources of small-arms fire, mortars and similar weapons using the thermal signature of the projectile rather than a muzzle flash. The thermal signature of a projectile, caused by friction as the projectile travels along its trajectory, cannot be concealed and is easily discriminated from optical clutter. The LLNL system was recently demonstrated at the MOUT facility of the Aberdeen Test Center [1]. In the live-fire demonstration, shooters armed with a variety of small-arms, including M-16s, AK-47s, handguns, mortars and rockets, were arranged at several positions in around the facility. Experiments ranged from a single-weapon firing a single-shot to simultaneous fire of all weapons on full automatic. The LLNL projectile tracking system was demonstrated to localize multiple shooters at ranges up to 400m, far greater than previous demonstrations. Furthermore, the system was shown to be immune to optical clutter that is typical in urban combat. This paper describes the image processing and localization algorithms designed to exploit the thermal signature of projectiles for shooter localization. The paper begins with a description of the image processing that extracts projectile information from a sequence of infrared images. Key to the processing is an adaptive spatio-temporal filter developed to suppress scene clutter. The filtered image sequence is further processed to produce a set of parameterized regions, which are classified using several discriminate functions. Regions that are classified as projectiles are passed to a data association algorithm that matches features from these regions with existing tracks, or initializes new tracks as needed. A Kalman filter is used to smooth and extrapolate existing tracks. Shooter locations are determined by solving a combinatorial least-squares solution for all bullet tracks. It also provides an error ellipse for each shooter, quantifying the uncertainty of shooter location. The paper concludes with examples from the live-fire exercise at the Aberdeen Test Center.« less
Holographic radar imaging privacy techniques utilizing dual-frequency implementation
NASA Astrophysics Data System (ADS)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-01
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.
Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-18
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less
Identification of nuclear weapons
Mihalczo, J.T.; King, W.T.
1987-04-10
A method and apparatus for non-invasively indentifying different types of nuclear weapons is disclosed. A neutron generator is placed against the weapon to generate a stream of neutrons causing fissioning within the weapon. A first detects the generation of the neutrons and produces a signal indicative thereof. A second particle detector located on the opposite side of the weapon detects the fission particles and produces signals indicative thereof. The signals are converted into a detected pattern and a computer compares the detected pattern with known patterns of weapons and indicates which known weapon has a substantially similar pattern. Either a time distribution pattern or noise analysis pattern, or both, is used. Gamma-neutron discrimination and a third particle detector for fission particles adjacent the second particle detector are preferably used. The neutrons are generated by either a decay neutron source or a pulled neutron particle accelerator.
NASA Astrophysics Data System (ADS)
Gilbo, Yekaterina; Wijesooriya, Krishni; Liyanage, Nilanga
2017-01-01
Customarily applied in homeland security for identifying concealed explosives and chemical weapons, NRF (Nuclear Resonance Fluorescence) may have high potential in determining atomic compositions of body tissue. High energy photons incident on a target excite the target nuclei causing characteristic re-emission of resonance photons. As the nuclei of each isotope have well-defined excitation energies, NRF uniquely indicates the isotopic content of the target. NRF radiation corresponding to nuclear isotopes present in the human body is emitted during radiotherapy based on Bremsstrahlung photons generated in a linear electron accelerator. We have developed a Geant4 simulation in order to help assess NRF capabilities in detecting, mapping, and characterizing tumors. We have imported a digital phantom into the simulation using anatomical data linked to known chemical compositions of various tissues. Work is ongoing to implement the University of Virginia's cancer center treatment setup and patient geometry, and to collect and analyze the simulation's physics quantities to evaluate the potential of NRF for medical imaging applications. Preliminary results will be presented.
Detecting persons concealed in a vehicle
Tucker, Jr., Raymond W.
2005-03-29
An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.
Detection and treatment of chemical weapons and/or biological pathogens
Mariella Jr., Raymond P.
2004-09-07
A system for detection and treatment of chemical weapons and/or biological pathogens uses a detector system, an electrostatic precipitator or scrubber, a circulation system, and a control. The precipitator or scrubber is activated in response to a signal from the detector upon the detection of chemical weapons and/or biological pathogens.
NASA Astrophysics Data System (ADS)
Sinha, V.; Srivastava, A.; Lee, H. K.; Liu, X.
2013-05-01
The successful creation and operation of a neutron and X-ray combined computed tomography (NXCT) system has been demonstrated by researchers at the Missouri University of Science and Technology. The NXCT system has numerous applications in the field of material characterization and object identification in materials with a mixture of atomic numbers represented. Presently, the feasibility studies have been performed for explosive detection and homeland security applications, particularly in concealed material detection and determination of the light atomic number materials. These materials cannot be detected using traditional X-ray imaging. The new system has the capability to provide complete structural and compositional information due to the complementary nature of X-ray and neutron interactions with materials. The design of the NXCT system facilitates simultaneous and instantaneous imaging operation, promising enhanced detection capabilities of explosive materials, low atomic number materials and illicit materials for homeland security applications. In addition, a sample positioning system allowing the user to remotely and automatically manipulate the sample makes the system viable for commercial applications. Several explosives and weapon simulants have been imaged and the results are provided. The fusion algorithms which combine the data from the neutron and X-ray imaging produce superior images. This paper is a compete overview of the NXCT system for feasibility studies of explosive detection and homeland security applications. The design of the system, operation, algorithm development, and detection schemes are provided. This is the first combined neutron and X-ray computed tomography system in operation. Furthermore, the method of fusing neutron and X-ray images together is a new approach which provides high contrast images of the desired object. The system could serve as a standardized tool in nondestructive testing of many applications, especially in explosives detection and homeland security research.
Detection of abandoned mines/caves using airborne LWIR hyperspectral data
NASA Astrophysics Data System (ADS)
Shen, Sylvia S.; Roettiger, Kurt A.
2012-09-01
The detection of underground structures, both natural and man-made, continues to be an important requirement in both the military/intelligence and civil communities. There are estimates that as many as 70,000 abandoned mines/caves exist across the nation. These mines represent significant hazards to public health and safety, and they are of concern to Government agencies at the local, state, and federal levels. NASA is interested in the detection of caves on Mars and the Moon in anticipation of future manned space missions. And, the military/ intelligence community is interested in detecting caves, mines, and other underground structures that may be used to conceal the production of weapons of mass destruction or to harbor insurgents or other persons of interest by the terrorists. Locating these mines/caves scattered over millions of square miles is an enormous task, and limited resources necessitate the development of an efficient and effective broad area search strategy using remote sensing technologies. This paper describes an internally-funded research project of The Aerospace Corporation (Aerospace) to assess the feasibility of using airborne hyperspectral data to detect abandoned cave/mine entrances in a broad-area search application. In this research, we have demonstrated the potential utility of using thermal contrast between the cave/mine entrance and the ambient environment as a discriminatory signature. We have also demonstrated the use of a water vapor absorption line at12.55 μm and a quartz absorption feature at 9.25 μm as discriminatory signatures. Further work is required to assess the broader applicability of these signatures.
An interfering Go/No-go task does not affect accuracy in a Concealed Information Test.
Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter
2008-04-01
Following the idea that response inhibition processes play a central role in concealing information, the present study investigated the influence of a Go/No-go task as an interfering mental activity, performed parallel to the Concealed Information Test (CIT), on the detectability of concealed information. 40 undergraduate students participated in a mock-crime experiment and simultaneously performed a CIT and a Go/No-go task. Electrodermal activity (EDA), respiration line length (RLL), heart rate (HR) and finger pulse waveform length (FPWL) were registered. Reaction times were recorded as behavioral measures in the Go/No-go task as well as in the CIT. As a within-subject control condition, the CIT was also applied without an additional task. The parallel task did not influence the mean differences of the physiological measures of the mock-crime-related probe and the irrelevant items. This finding might possibly be due to the fact that the applied parallel task induced a tonic rather than a phasic mental activity, which did not influence differential responding to CIT items. No physiological evidence for an interaction between the parallel task and sub-processes of deception (e.g. inhibition) was found. Subjects' performance in the Go/No-go parallel task did not contribute to the detection of concealed information. Generalizability needs further investigations of different variations of the parallel task.
Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.
2009-01-01
In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.
NASA Astrophysics Data System (ADS)
Lieber, Keir
Nuclear deterrence rests on the survivability of nuclear arsenals. For much of the nuclear age, counterforce disarming attacks those aimed at eliminating nuclear forces were nearly impossible because of the ability of potential victims to hide and protect their weapons. However, technological developments are eroding this foundation of nuclear deterrence. Advances rooted in the computer revolution have made nuclear forces around the world far more vulnerable than before. Specifically, two key approaches that countries have relied on to ensure arsenal survivability since the dawn of the nuclear age hardening and concealment have been undercut by leaps in weapons accuracy and a revolution in remote sensing. Various models, methods, and evidence demonstrate the emergence of new possibilities for counterforce disarming strikes. In short, the task of securing nuclear arsenals against attack is a far greater challenge than it was in the past. The new era of counterforce challenges the basis for confidence in contemporary deterrence stability, raises critical issues for national and international security policy, and sheds light on one of the enduring theoretical puzzles of the nuclear era: why international security competition has endured in the shadow of the nuclear revolution.
Detecting concealed objects at a checkpoint
McMakin, Douglas L [Richland, WA; Hall, Thomas E [Kennewick, WA; Sheen, David M [Richland, WA; Severtsen, Ronald H [Richland, WA
2008-07-29
Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.
Determinants of felt stigma in epilepsy.
Aydemir, N; Kaya, B; Yıldız, G; Öztura, I; Baklan, B
2016-05-01
The present study aimed to determine the level of felt stigma, overprotection, concealment, and concerns related to epilepsy in different life domains by using culturally-specific scales for Turkish individuals with epilepsy. Also, it aimed to detect relations among the study variables and to determine the variables which predict felt stigma. For this purpose, felt stigma scale, overprotection scale, concealment of epilepsy scale, and concerns of epilepsy scale were administered to two hundred adult persons with epilepsy (PWE). The results showed that almost half of the participants reported felt stigma, overprotection, concealment of epilepsy, concerns related to future occupation, and concerns related to social life. Almost all the study variables show correlations with each other. Concealment of epilepsy, concerns related to social life, and concerns related to future occupation were found as the predictors of felt stigma. Copyright © 2016 Elsevier Inc. All rights reserved.
Non-invasive detection of cocaine dissolved in beverages using displaced Raman spectroscopy.
Eliasson, C; Macleod, N A; Matousek, P
2008-01-21
We demonstrate the potential of Raman spectroscopy to detect cocaine concealed inside transparent glass bottles containing alcoholic beverages. A clear Raman signature of cocaine with good signal-to-noise was obtained from a approximately 300 g solution of adulterated cocaine (purity 75%) in a 0.7 L authentic brown bottle of rum with 1 s acquisition time. The detection limit was estimated to be of the order of 9 g of pure cocaine per 0.7 L (approximately 0.04 moles L(-1)) with 1 s acquisition time. The technique holds great promise for the fast, non-invasive, detection of concealed illicit compounds inside beverages using portable Raman instruments, thus permitting drug trafficking to be combated more effectively.
Induction detection of concealed bulk banknotes
NASA Astrophysics Data System (ADS)
Fuller, Christopher; Chen, Antao
2011-10-01
Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.
Extremely High-Frequency Holographic Radar Imaging of Personnel and Mail
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Sheen, David M.; Griffin, Jeffrey W.
2006-08-01
The awareness of terrorists covertly transporting chemical warfare (CW) and biological warfare (BW) agents into government, military, and civilian facilities to harm the occupants has increased dramatically since the attacks of 9/11. Government and civilian security personnel have a need for innovative surveillance technology that can rapidly detect these lethal agents, even when they are hidden away in sealed containers and concealed either under clothing or in hand-carried items such as mailed packages or handbags. Sensor technology that detects BW and CW agents in mail or sealed containers carried under the clothing are under development. One promising sensor technology presentlymore » under development to defeat these threats is active millimeter-wave holographic radar imaging, which can readily image concealed items behind paper, cardboard, and clothing. Feasibility imaging studies at frequencies greater than 40 GHz have been conducted to determine whether simulated biological or chemical agents concealed in mail packages or under clothing could be detected using this extremely high-frequency imaging technique. The results of this imaging study will be presented in this paper.« less
Full polarimetric millimetre wave radar for stand-off security screening
NASA Astrophysics Data System (ADS)
Blackhurst, Eddie; Salmon, Neil; Southgate, Matthew
2017-10-01
The development and measurements are described of a frequency modulated continuous wave (FMCW) mono-static millimetre wave full polarimetric radar, operating at k-band (18 to 26 GHz). The system has been designed to explore the feasibility of using full polarimetry for the detection of concealed weapons, and person borne improvised explosive devices (PBIED). The philosophy of this scheme is a means to extract the maximum information content from a target which is normally in the single spatial pixel (sometimes sub-pixel) configuration in stand-off (tens of metres) and crowd surveillance scenarios. The radar comprises a vector network analyser (VNA), an orthomode transducer and a conical horn antenna. A calibration strategy is discussed and demonstrated using a variety of known calibration targets with known reflective properties, including a flat metal plate, dihedral reflector, metal sphere, helix and dipole. The orthomode transducer is based on a high performance linear polarizer of the turnstile type with isolation better than - 35dB between orthogonal polarisations. The calibration enables the polarimetric Sinclair scattering matrix to be measured at each frequency for coherent polarimetry, and this can be extended using multiple measurements via the Kennaugh matrix to investigate incoherent full polarimetry.
Bultman, Mark W.
2013-01-01
Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral-resource target.
A Concealed Information Test with multimodal measurement.
Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter
2010-03-01
A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tuemer, T.O.; Doan, L.; Su, C.W.
2000-07-01
A Compact Integrated Narcotics Detection Instrument (CINDI) has been developed at NOVA R and D, Inc., in cooperation with the US Coast Guard. This detector utilizes neutrons emitted from {sup 252}Cf. Neutrons emitted from the front face of CINDI penetrate dense compartment barrier materials with little change in energy but are backscattered by hydrogen-rich materials such as drugs. The backscattered neutrons are detected, and the rate is displayed by a microprocessor-controller integrated into CINDI. The operator guides the detector along a suspected area and receives immediate feedback from the state-of-the-art electronics. For user safety, the device incorporates a highly sensitivemore » detection scheme to permit the use of a very weak radioactive source, without compromising detectability. CINDI is capable of detecting narcotics effectively behind panels made of steel, wood, fiberglass, or even lead-lined materials. This makes it useful for inspecting marine vessels, ship bulkheads, automobiles, structure walls, or small sealed containers. Figure 2 shows three views of the CINDI instrument. CINDI responds strongly to hydrogen-rich materials such as narcotics. It has been tested at NOVA, the US Coast Guard, and Brewt Power Systems. The results of the tests show excellent response and specificity to narcotics. CINDI has led to a new technology that shows promise for identifying the concealed contraband. The new technique uses a fusion of two independent but complementary signals for detecting and possibly identifying concealed drugs in a variety of carriers such as vehicles, marine vessels, airplanes, containers, cargo, and luggage. The carriers will be scanned using both neutron and gamma-ray sources. The signal from both the neutron and gamma-ray backscattering and/or transmission can be used simultaneously to detect and possibly identify the contrabands it has been trained for. A system that can produce three-dimensional images for both signals may also be developed. The two images may be combined and analyzed by a fast host computer to detect concealed contraband. The two independent signatures when analyzed simultaneously may help determine the type of concealed contraband.« less
Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.
Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew
2014-03-01
Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p < 0.001); that increase was proportionately reflected in a relative increase in state firearm purchase in the postlaw period (1.50% prelaw vs. 1.59% postlaw, p < 0.001). Overall, victims of events potentially involving guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.
Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter
2014-03-01
In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.
NASA Astrophysics Data System (ADS)
Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan
2014-11-01
The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.
Anklam, Charles; Kirby, Adam; Sharevski, Filipo; Dietz, J Eric
2015-01-01
Active shooting violence at confined settings, such as educational institutions, poses serious security concerns to public safety. In studying the effects of active shooter scenarios, the common denominator associated with all events, regardless of reason/intent for shooter motives, or type of weapons used, was the location chosen and time expended between the beginning of the event and its culmination. This in turn directly correlates to number of casualties incurred in any given event. The longer the event protracts, the more casualties are incurred until law enforcement or another barrier can react and culminate the situation. Using AnyLogic technology, devise modeling scenarios to test multiple hypotheses against free-agent modeling simulation to determine the best method to reduce casualties associated with active shooter scenarios. Test four possible scenarios of responding to active shooter in a public school setting using agent-based computer modeling techniques-scenario 1: basic scenario where no access control or any type of security is used within the school; scenario 2, scenario assumes that concealed carry individual(s) (5-10 percent of the work force) are present in the school; scenario 3, scenario assumes that the school has assigned resource officer; scenario 4, scenario assumes that the school has assigned resource officer and concealed carry individual(s) (5-10 percent) present in the school. Statistical data from modeling scenarios indicating which tested hypothesis resulted in fewer casualties and quicker culmination of event. The use of AnyLogic proved the initial hypothesis that a decrease on response time to an active shooter scenario directly reduced victim casualties. Modeling tests show statistically significant fewer casualties in scenarios where on scene armed responders such as resource officers and concealed carry personnel were present.
Remote laser drilling and sampling system for the detection of concealed explosives
NASA Astrophysics Data System (ADS)
Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.
2017-05-01
The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.
Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura
2013-01-01
The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918
Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura
2015-01-01
Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of deception detection techniques from the laboratory to real-life settings. PMID:25699516
Current Considerations About the Elderly and Firearms
Mertens, Brian
2012-01-01
In the United States, more than 17 million people aged 65 years or older own a firearm. They have the highest rate of suicide by a firearm, and recent data suggest that a disproportionate number apply to carry a concealed weapon. At least one new handgun has been designed and marketed for older people. Memory, thinking, and judgment as well as physical and behavioral competence issues related to an elderly person's safe operation of a motor vehicle apply to firearms, too. Gun availability can pose a particular risk to those with dementia and to their caretakers. The elderly constitute a substantial and rapidly growing population and market segment for whom the public health implications of firearm production, promotion, access, ownership, and use merit consideration. PMID:22390501
Current considerations about the elderly and firearms.
Mertens, Brian; Sorenson, Susan B
2012-03-01
In the United States, more than 17 million people aged 65 years or older own a firearm. They have the highest rate of suicide by a firearm, and recent data suggest that a disproportionate number apply to carry a concealed weapon. At least one new handgun has been designed and marketed for older people. Memory, thinking, and judgment as well as physical and behavioral competence issues related to an elderly person's safe operation of a motor vehicle apply to firearms, too. Gun availability can pose a particular risk to those with dementia and to their caretakers. The elderly constitute a substantial and rapidly growing population and market segment for whom the public health implications of firearm production, promotion, access, ownership, and use merit consideration.
Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji
2014-10-01
We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.
2016-06-01
of these three pillars, yet current detectors for fast neutrons from nuclear weapons materials are bulky, expensive, and have low efficiencies, well...passive fast neutron emissions. Similarly, isotopes present in weapons grade Plutonium (which is predominantly Pu-239), especially Pu-240, are... weapons material, and the propensity of the neutrons resulting from their fission to inelastically scatter, defines the interactions of interest
Metal Detector Searches: An Effective Means To Help Keep Weapons Out of Schools.
ERIC Educational Resources Information Center
Johnson, Robert S.
2000-01-01
Disagrees with Ferraraccio's views and argues that: (1) students do bring illegal weapons to school; (2) metal detectors do detect weapons and help schools to disarm students; (3) disarming students reduces the threat of violence; and (4) courts have repeatedly approved the constitutionality of weapon-related suspicionless student searches…
Anderson, E.D.; Smith, S.M.; Giles, S.A.; Granitto, Matthew; Eppinger, R.G.; Bedrosian, P.A.; Shah, A.K.; Kelley, K.D.; Fey, D.L.; Minsley, B.J.; Brown, P.J.
2011-01-01
In 2007, the U.S. Geological Survey began a multidisciplinary study in southwest Alaska to investigate the setting and detectability of mineral deposits in concealed volcanic and glacial terranes. The study area hosts the world-class Pebble porphyry Cu-Au-Mo deposit, and through collaboration with the Pebble Limited Partnership, a range of geophysical and geochemical investigations was carried out in proximity to the deposit. The deposit is almost entirely concealed by tundra, glacial deposits, and post-mineralization volcanic rocks. The discovery of mineral resources beneath cover is becoming more important because most of the mineral resources at the surface have already been discovered. Research is needed to identify ways in which to assess for concealed mineral resources. This report presents the uninterpreted geophysical measurements and geochemical and mineralogical analytical data from samples collected during the summer field seasons from 2007 to 2010, and makes the data available in a single Geographic Information System (GIS) database.
NASA Astrophysics Data System (ADS)
Sheen, David M.; Fernandes, Justin L.; Tedeschi, Jonathan R.; McMakin, Douglas L.; Jones, A. Mark; Lechelt, Wayne M.; Severtsen, Ronald H.
2013-05-01
Active millimeter-wave imaging is currently being used for personnel screening at airports and other high-security facilities. The cylindrical imaging techniques used in the deployed systems are based on licensed technology developed at the Pacific Northwest National Laboratory. The cylindrical and a related planar imaging technique form three-dimensional images by scanning a diverging beam swept frequency transceiver over a two-dimensional aperture and mathematically focusing or reconstructing the data into three-dimensional images of the person being screened. The resolution, clothing penetration, and image illumination quality obtained with these techniques can be significantly enhanced through the selection of the aperture size, antenna beamwidth, center frequency, and bandwidth. The lateral resolution can be improved by increasing the center frequency, or it can be increased with a larger antenna beamwidth. The wide beamwidth approach can significantly improve illumination quality relative to a higher frequency system. Additionally, a wide antenna beamwidth allows for operation at a lower center frequency resulting in less scattering and attenuation from the clothing. The depth resolution of the system can be improved by increasing the bandwidth. Utilization of extremely wide bandwidths of up to 30 GHz can result in depth resolution as fine as 5 mm. This wider bandwidth operation may allow for improved detection techniques based on high range resolution. In this paper, the results of an extensive imaging study that explored the advantages of using extremely wide beamwidth and bandwidth are presented, primarily for 10-40 GHz frequency band.
Hydrologic control of carbon cycling and aged carbon discharge in the Congo River basin
NASA Astrophysics Data System (ADS)
Schefuß, Enno; Eglinton, Timothy I.; Spencer-Jones, Charlotte L.; Rullkötter, Jürgen; de Pol-Holz, Ricardo; Talbot, Helen M.; Grootes, Pieter M.; Schneider, Ralph R.
2016-09-01
The age of organic material discharged by rivers provides information about its sources and carbon cycling processes within watersheds. Although elevated ages in fluvially transported organic matter are usually explained by erosion of soils and sedimentary deposits, it is commonly assumed that mainly young organic material is discharged from flat tropical watersheds due to their extensive plant cover and rapid carbon turnover. Here we present compound-specific radiocarbon data of terrigenous organic fractions from a sedimentary archive offshore the Congo River, in conjunction with molecular markers for methane-producing land cover reflecting wetland extent. We find that the Congo River has been discharging aged organic matter for several thousand years, with apparently increasing ages from the mid- to the Late Holocene. This suggests that aged organic matter in modern samples is concealed by radiocarbon from atmospheric nuclear weapons testing. By comparison to indicators for past rainfall changes we detect a systematic control of organic matter sequestration and release by continental hydrology, mediating temporary carbon storage in wetlands. As aridification also leads to exposure and rapid remineralization of large amounts of previously stored labile organic matter, we infer that this process may cause a profound direct climate feedback that is at present underestimated in carbon cycle assessments.
Camouflage and visual perception
Troscianko, Tom; Benton, Christopher P.; Lovell, P. George; Tolhurst, David J.; Pizlo, Zygmunt
2008-01-01
How does an animal conceal itself from visual detection by other animals? This review paper seeks to identify general principles that may apply in this broad area. It considers mechanisms of visual encoding, of grouping and object encoding, and of search. In most cases, the evidence base comes from studies of humans or species whose vision approximates to that of humans. The effort is hampered by a relatively sparse literature on visual function in natural environments and with complex foraging tasks. However, some general constraints emerge as being potentially powerful principles in understanding concealment—a ‘constraint’ here means a set of simplifying assumptions. Strategies that disrupt the unambiguous encoding of discontinuities of intensity (edges), and of other key visual attributes, such as motion, are key here. Similar strategies may also defeat grouping and object-encoding mechanisms. Finally, the paper considers how we may understand the processes of search for complex targets in complex scenes. The aim is to provide a number of pointers towards issues, which may be of assistance in understanding camouflage and concealment, particularly with reference to how visual systems can detect the shape of complex, concealed objects. PMID:18990671
Habitat drives dispersal and survival of translocated juvenile desert tortoises
Nafus, Melia G.; Esque, Todd C.; Averill-Murray, Roy C.; Nussear, Kenneth E.; Swaisgood, Ronald R.
2017-01-01
5.Synthesis and applications. Resource managers using translocations as a conservation tool should prioritize acquiring data linking habitat to fitness. In particular, for species that depend on avoiding detection, refuges such as burrows and habitat that improved concealment had notable ability to improve survival and dispersal. Our study on juvenile Mojave desert tortoises showed that refuge availability or the distributions of habitat appropriate for concealment are important considerations for identifying translocation sites for species highly dependent on crypsis, camouflage, or other forms of habitat matching.
Goal-Directed Modulation of Neural Memory Patterns: Implications for fMRI-Based Memory Detection.
Uncapher, Melina R; Boyd-Meredith, J Tyler; Chow, Tiffany E; Rissman, Jesse; Wagner, Anthony D
2015-06-03
Remembering a past event elicits distributed neural patterns that can be distinguished from patterns elicited when encountering novel information. These differing patterns can be decoded with relatively high diagnostic accuracy for individual memories using multivoxel pattern analysis (MVPA) of fMRI data. Brain-based memory detection--if valid and reliable--would have clear utility beyond the domain of cognitive neuroscience, in the realm of law, marketing, and beyond. However, a significant boundary condition on memory decoding validity may be the deployment of "countermeasures": strategies used to mask memory signals. Here we tested the vulnerability of fMRI-based memory detection to countermeasures, using a paradigm that bears resemblance to eyewitness identification. Participants were scanned while performing two tasks on previously studied and novel faces: (1) a standard recognition memory task; and (2) a task wherein they attempted to conceal their true memory state. Univariate analyses revealed that participants were able to strategically modulate neural responses, averaged across trials, in regions implicated in memory retrieval, including the hippocampus and angular gyrus. Moreover, regions associated with goal-directed shifts of attention and thought substitution supported memory concealment, and those associated with memory generation supported novelty concealment. Critically, whereas MVPA enabled reliable classification of memory states when participants reported memory truthfully, the ability to decode memory on individual trials was compromised, even reversing, during attempts to conceal memory. Together, these findings demonstrate that strategic goal states can be deployed to mask memory-related neural patterns and foil memory decoding technology, placing a significant boundary condition on their real-world utility. Copyright © 2015 the authors 0270-6474/15/358531-15$15.00/0.
New opportunities for quality enhancing of images captured by passive THz camera
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.
2014-10-01
As it is well-known, the passive THz camera allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. Obviously, efficiency of using the passive THz camera depends on its temperature resolution. This characteristic specifies possibilities of the detection for concealed object: minimal size of the object; maximal distance of the detection; image quality. Computer processing of the THz image may lead to many times improving of the image quality without any additional engineering efforts. Therefore, developing of modern computer code for its application to THz images is urgent problem. Using appropriate new methods one may expect such temperature resolution which will allow to see banknote in pocket of a person without any real contact. Modern algorithms for computer processing of THz images allow also to see object inside the human body using a temperature trace on the human skin. This circumstance enhances essentially opportunity of passive THz camera applications for counterterrorism problems. We demonstrate opportunities, achieved at present time, for the detection both of concealed objects and of clothes components due to using of computer processing of images captured by passive THz cameras, manufactured by various companies. Another important result discussed in the paper consists in observation of both THz radiation emitted by incandescent lamp and image reflected from ceramic floorplate. We consider images produced by THz passive cameras manufactured by Microsemi Corp., and ThruVision Corp., and Capital Normal University (Beijing, China). All algorithms for computer processing of the THz images under consideration in this paper were developed by Russian part of author list. Keywords: THz wave, passive imaging camera, computer processing, security screening, concealed and forbidden objects, reflected image, hand seeing, banknote seeing, ceramic floorplate, incandescent lamp.
NASA Astrophysics Data System (ADS)
Nguyen, Lam; Wong, David; Ressler, Marc; Koenig, Francois; Stanton, Brian; Smith, Gregory; Sichina, Jeffrey; Kappra, Karl
2007-04-01
The U.S. Army Research Laboratory (ARL), as part of a mission and customer funded exploratory program, has developed a new low-frequency, ultra-wideband (UWB) synthetic aperture radar (SAR) for forward imaging to support the Army's vision of an autonomous navigation system for robotic ground vehicles. These unmanned vehicles, equipped with an array of imaging sensors, will be tasked to help detect man-made obstacles such as concealed targets, enemy minefields, and booby traps, as well as other natural obstacles such as ditches, and bodies of water. The ability of UWB radar technology to help detect concealed objects has been documented in the past and could provide an important obstacle avoidance capability for autonomous navigation systems, which would improve the speed and maneuverability of these vehicles and consequently increase the survivability of the U. S. forces on the battlefield. One of the primary features of the radar is the ability to collect and process data at combat pace in an affordable, compact, and lightweight package. To achieve this, the radar is based on the synchronous impulse reconstruction (SIRE) technique where several relatively slow and inexpensive analog-to-digital (A/D) converters are used to sample the wide bandwidth of the radar signals. We conducted an experiment this winter at Aberdeen Proving Ground (APG) to support the phenomenological studies of the backscatter from positive and negative obstacles for autonomous robotic vehicle navigation, as well as the detection of concealed targets of interest to the Army. In this paper, we briefly describe the UWB SIRE radar and the test setup in the experiment. We will also describe the signal processing and the forward imaging techniques used in the experiment. Finally, we will present imagery of man-made obstacles such as barriers, concertina wires, and mines.
Chemical Weapons Exposures in Iraq: Challenges of a Public Health Response a Decade Later.
Baird, Coleen; Mirza, Raul; Sharkey, Jessica M; Teichman, Ron; Longmire, Romarius; Harkins, Deanna; Llanos, Joseph; Abraham, Joseph; McCannon, Charles; Heller, Jack; Tinklepaugh, Carole; Rice, William
2016-01-01
An October 14, 2014 article in The New York Times reported that the US Department of Defense (DoD) concealed, for nearly a decade, circumstances surrounding service members' exposure to chemical warfare agents (CWA) while deployed to Iraq in support of Operations Iraqi Freedom and New Dawn from March 13, 2003, to December 31, 2011, and alleged failure of the DoD to provide expedient and adequate medical care. This report prompted the DoD to devise a public health investigation, with the Army Public Health Center (Provisional) as the lead agency to identify, evaluate, document, and track CWA casualties of the Iraq war. Further, the DoD revisited and revised clinical guidelines and health policies concerning CWA exposure based on current evidence-based guidelines and best practices.
Pendulum detector testing device
Gonsalves, J.M.
1997-09-30
A detector testing device is described which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: (1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, (2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and (3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements. 5 figs.
Pendulum detector testing device
Gonsalves, John M.
1997-01-01
A detector testing device which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: 1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, 2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and 3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements.
NASA Astrophysics Data System (ADS)
Franck, Charmaine C.; Lee, Dave; Espinola, Richard L.; Murrill, Steven R.; Jacobs, Eddie L.; Griffin, Steve T.; Petkie, Douglas T.; Reynolds, Joe
2007-04-01
This paper describes the design and performance of the U.S. Army RDECOM CERDEC Night Vision and Electronic Sensors Directorate's (NVESD), active 0.640-THz imaging testbed, developed in support of the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. The laboratory measurements and standoff images were acquired during the development of a NVESD and Army Research Laboratory terahertz imaging performance model. The imaging testbed is based on a 12-inch-diameter Off-Axis Elliptical (OAE) mirror designed with one focal length at 1 m and the other at 10 m. This paper will describe the design considerations of the OAE-mirror, dual-capability, active imaging testbed, as well as measurement/imaging results used to further develop the model.
Industry Studies 2004: Biotechnology
2004-01-01
for biological agent research, development, and production are available on the open market. Since biological weapons are relatively cheap, easy to...growing concern is that non-state actors will acquire and use a biological weapon , the “poor man’s nuclear weapon .” Such action is extremely difficult...to detect and counter. International Protocols and the Need to Control Agents and Technologies - The Biological and Toxin Weapons Convention
15 CFR 742.2 - Proliferation of chemical and biological weapons.
Code of Federal Regulations, 2010 CFR
2010-01-01
... in ECCN 1C350 (precursor and intermediate chemicals used in the production of chemical warfare agents... on the CCL, chemical detection systems controlled by 1A004.c for detecting chemical warfare agents... used in the production of chemical weapons precursors or chemical warfare agents. (vii) Equipment and...
Deep Raman spectroscopy for the non-invasive standoff detection of concealed chemical threat agents.
Izake, Emad L; Cletus, Biju; Olds, William; Sundarajoo, Shankaran; Fredericks, Peter M; Jaatinen, Esa
2012-05-30
Deep Raman spectroscopy has been utilized for the standoff detection of concealed chemical threat agents from a distance of 15 m under real life background illumination conditions. By using combined time and space resolved measurements, various explosive precursors hidden in opaque plastic containers were identified non-invasively. Our results confirm that combined time and space resolved Raman spectroscopy leads to higher selectivity towards the sub-layer over the surface layer as well as enhanced rejection of fluorescence from the container surface when compared to standoff spatially offset Raman spectroscopy. Raman spectra that have minimal interference from the packaging material and good signal-to-noise ratio were acquired within 5 s of measurement time. A new combined time and space resolved Raman spectrometer has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than picosecond-based laboratory systems. Copyright © 2012 Elsevier B.V. All rights reserved.
Microwave Detection With Single-Band Metamaterials For High Power Microwave Weapons
2017-12-01
DETECTION WITH SINGLE-BAND METAMATERIALS FOR HIGH POWER MICROWAVE WEAPONS by Edward V. Wulff December 2017 Thesis Advisor: Dragoslav Grbovic...3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE MICROWAVE DETECTION WITH SINGLE-BAND METAMATERIALS FOR HIGH POWER...IRB number ____N/A____. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release. Distribution is unlimited. 12b. DISTRIBUTION
Performance calculation and simulation system of high energy laser weapon
NASA Astrophysics Data System (ADS)
Wang, Pei; Liu, Min; Su, Yu; Zhang, Ke
2014-12-01
High energy laser weapons are ready for some of today's most challenging military applications. Based on the analysis of the main tactical/technical index and combating process of high energy laser weapon, a performance calculation and simulation system of high energy laser weapon was established. Firstly, the index decomposition and workflow of high energy laser weapon was proposed. The entire system was composed of six parts, including classical target, platform of laser weapon, detect sensor, tracking and pointing control, laser atmosphere propagation and damage assessment module. Then, the index calculation modules were designed. Finally, anti-missile interception simulation was performed. The system can provide reference and basis for the analysis and evaluation of high energy laser weapon efficiency.
Stedmon, Alex W; Eachus, Peter; Baillie, Les; Tallis, Huw; Donkor, Richard; Edlin-White, Robert; Bracewell, Robert
2015-03-01
Individuals trying to conceal knowledge from interrogators are likely to experience raised levels of stress that can manifest itself across biological, physiological, psychological and behavioural factors, providing an opportunity for detection. Using established research paradigms an innovative scalable interrogation was designed in which participants were given a 'token' that represented information they had to conceal from interviewers. A control group did not receive a token and therefore did not have to deceive the investigators. The aim of this investigation was to examine differences between deceivers and truth-tellers across the four factors by collecting data for cortisol levels, sweat samples, heart-rate, respiration, skin temperature, subjective stress ratings and video and audio recordings. The results provided an integrated understanding of responses to interrogation by those actively concealing information and those acting innocently. Of particular importance, the results also suggest, for the first time in an interrogation setting, that stressed individuals may secrete a volatile steroid based marker that could be used for stand-off detection. The findings are discussed in relation to developing a scalable interrogation protocol for future research in this area. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Harvey, Marc
2014-09-01
This paper proposes a model of human uniqueness based on an unusual distinction between two contrasted kinds of political competition and political status: (1) antagonistic competition, in quest of dominance (antagonistic status), a zero-sum, self-limiting game whose stake--who takes what, when, how--summarizes a classical definition of politics (Lasswell 1936), and (2) synergistic competition, in quest of merit (synergistic status), a positive-sum, self-reinforcing game whose stake becomes "who brings what to a team's common good." In this view, Rawls's (1971) famous virtual "veil of ignorance" mainly conceals politics' antagonistic stakes so as to devise the principles of a just, egalitarian society, yet without providing any means to enforce these ideals (Sen 2009). Instead, this paper proposes that human uniqueness flourished under a real "adapted veil of ignorance" concealing the steady inflation of synergistic politics which resulted from early humans' sturdy egalitarianism. This proposition divides into four parts: (1) early humans first stumbled on a purely cultural means to enforce a unique kind of within-team antagonistic equality--dyadic balanced deterrence thanks to handheld weapons (Chapais 2008); (2) this cultural innovation is thus closely tied to humans' darkest side, but it also launched the cumulative evolution of humans' brightest qualities--egalitarian team synergy and solidarity, together with the associated synergistic intelligence, culture, and communications; (3) runaway synergistic competition for differential merit among antagonistically equal obligate teammates is the single politically selective mechanism behind the cumulative evolution of all these brighter qualities, but numerous factors to be clarified here conceal this mighty evolutionary driver; (4) this veil of ignorance persists today, which explains why humans' unique prosocial capacities are still not clearly understood by science. The purpose of this paper is to start lifting this now-ill-adapted veil of ignorance, thus uncovering the tight functional relations between egalitarian team solidarity and the evolution of human uniqueness.
Preventing lethal violence in schools: the case for entry-based weapons screening.
Mawson, Anthony R; Lapsley, Peter M; Hoffman, Allan M; Guignard, John C
2002-04-01
Violence-related behavior in schools has declined in recent years, but the perception of risk remains high. Disturbingly high percentages of students and teachers report staying home out of fear, and many students bring weapons to school for protection. Current proposals for preventing school violence include punishing the violence-prone, expulsion for weapon carriers, and creating a culture of nonviolence through various behavioral methods like conflict resolution. None of these proposals address the issue of lethal violence and hence personal safety. The risk of lethal violence in schools (related mainly to firearms) could be substantially reduced by creating an effective barrier between firearms and people. This could be achieved by using entry-based weapons detection systems similar to those now used in airports and courts. Decreasing the risk and fear of violence by converting schools into weapons-free zones would also be expected to increase attendance and improve scholastic performance. Randomized, controlled studies should be undertaken to evaluate the efficacy and cost-effectiveness of entry-based weapons detection systems for achieving these outcomes.
Taylor, J Eric T; Witt, Jessica K; Pratt, Jay
2017-01-01
Attentional allocation is flexibly altered by action-related priorities. Given that tools - and specifically weapons - can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and then searched for changes while holding a weapon or a control object. Results show an effect of training, highlighting the importance of sensorimotor experience for the action-relevant allocation of attention, and a possible interaction between training and the object held during search. Simulated training with ballistic weapons reduces change blindness. This result has implications for the interaction between tool use and attentional allocation.
A review of legislation restricting the intersection of firearms and alcohol in the U.S.
Carr, Brendan G; Porat, Gali; Wiebe, Douglas J; Branas, Charles C
2010-01-01
In the United States, injury is a leading cause of alcohol-related death, and alcohol use is the leading risk factor for injury. We reviewed state and federal legislation regulating the intersection of alcohol and firearms. We examined the current criminal codes of all 50 states and the District of Columbia using the databases Westlaw and LexisNexis to review restrictions on firearm use while intoxicated. We found three types of laws in 26 states that restrict firearm use by intoxicated people: sales or transfers are restricted in six states, carrying of concealed weapons is restricted in four states, and possession or discharge of a firearm while intoxicated is restricted in 20 states. Regulation of the carrying and use of firearms by acutely intoxicated individuals may represent a public health opportunity to reduce firearm-related injury.
Acoustic Parametric Array for Identifying Standoff Targets
NASA Astrophysics Data System (ADS)
Hinders, M. K.; Rudd, K. E.
2010-02-01
An integrated simulation method for investigating nonlinear sound beams and 3D acoustic scattering from any combination of complicated objects is presented. A standard finite-difference simulation method is used to model pulsed nonlinear sound propagation from a source to a scattering target via the KZK equation. Then, a parallel 3D acoustic simulation method based on the finite integration technique is used to model the acoustic wave interaction with the target. Any combination of objects and material layers can be placed into the 3D simulation space to study the resulting interaction. Several example simulations are presented to demonstrate the simulation method and 3D visualization techniques. The combined simulation method is validated by comparing experimental and simulation data and a demonstration of how this combined simulation method assisted in the development of a nonlinear acoustic concealed weapons detector is also presented.
Research on Integrated Geophysics Detect Potential Ground Fissure in City
NASA Astrophysics Data System (ADS)
Qian, R.
2017-12-01
North China confined aquifer lied 70 to 200 meters below the earth's surface has been exploited for several decades, which resulted in confined water table declining and has generated a mass of ground fissure. Some of them has reached the surface and the other is developing. As it is very difficult to stop the ground fissure coming into being, measures of avoiding are often taken. It brings great potential risk to urban architecture and municipal engineering. It is very important to find out specific distribution and characteristic of potential ground fissure in city with high resolution. The ground fissure is concealed, therefor, geophysical method is an important technology to detecting concealed ground fissure. However, it is very difficult to detect the characteristics of the superficial part of ground fissure directly, as it lies dozens of meters below and has only scores of centimeters fault displacement. This paper studies applied ground penetration radar, surface wave and shallow refleciton seismic to detect ground fissure. It sets up model of surface by taking advantage of high resolution of ground penetrating radar data, constrains Reilay wave inversion and improves its resolution. The high resolution reflection seismic is good at detecting the geology structure. The data processing and interpretation technique is developmented to avoid the pitfall and improve the aliability of the rusult. The experiment has been conducted in Shunyi District, Beijing in 2016. 5 lines were settled to collect data of integrated geophysical method. Development zone of concealed ground fissure was found and its ultra shallow layer location was detected by ground penetrating radar. A trial trench of 6 meters in depth was dug and obvious ground fissure development was found. Its upper end was 1.5 meters beneath the earth's surface with displacement of 0.3 meters. The favorable effect of this detection has provided a new way for detecting ground fissure in cities of China, such as Beijing and Xi'an etc. Keyword: Ground Fissure, GPR, Surface Wave; Shallow Reflection Seismic
Detection of Nuclear Weapons and Materials: Science, Technologies, Observations
2010-06-04
extensive use of photons, packets of energy with no rest mass and no electrical charge. Electromagnetic radiation consists of photons, and may be measured...bulk property, expressed as mass per unit volume. In general, the densest materials are those of high Z. These properties may be used to detect...SNM by detecting the time pattern of neutron generation. A subcritical mass of highly enriched uranium or weapons-grade plutonium can support a
Acoustic firearm discharge detection and classification in an enclosed environment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Luzi, Lorenzo; Gonzalez, Eric; Bruillard, Paul
2016-05-01
Two different signal processing algorithms are described for detection and classification of acoustic signals generated by firearm discharges in small enclosed spaces. The first is based on the logarithm of the signal energy. The second is a joint entropy. The current study indicates that a system using both signal energy and joint entropy would be able to both detect weapon discharges and classify weapon type, in small spaces, with high statistical certainty.
Optic-null space medium for cover-up cloaking without any negative refraction index materials
Sun, Fei; He, Sailing
2016-01-01
With the help of optic-null medium, we propose a new way to achieve invisibility by covering up the scattering without using any negative refraction index materials. Compared with previous methods to achieve invisibility, the function of our cloak is to cover up the scattering of the objects to be concealed by a background object of strong scattering. The concealed object can receive information from the outside world without being detected. Numerical simulations verify the performance of our cloak. The proposed method will be a great addition to existing invisibility technology. PMID:27383833
Optic-null space medium for cover-up cloaking without any negative refraction index materials.
Sun, Fei; He, Sailing
2016-07-07
With the help of optic-null medium, we propose a new way to achieve invisibility by covering up the scattering without using any negative refraction index materials. Compared with previous methods to achieve invisibility, the function of our cloak is to cover up the scattering of the objects to be concealed by a background object of strong scattering. The concealed object can receive information from the outside world without being detected. Numerical simulations verify the performance of our cloak. The proposed method will be a great addition to existing invisibility technology.
Microwave and Millimeter Wave Imaging Using Synthetic Aperture Focusing and Holographical Techniques
NASA Technical Reports Server (NTRS)
Case, Joseph Tobias
2005-01-01
Microwave and millimeter wave nondestructive testing and evaluation (NDT&E) methods have shown great potential for determining material composition in composite structures, determining material thickness or debond thickness between two layers, and determining the location and size of flaws, defects, and anomalies. The same testing methods have also shown great potential to produce relatively high-resolution images of voids inside Spray On Foam Insulation (SOFI) test panels using real focused methods employing lens antennas. An alternative to real focusing methods are synthetic focusing methods. The essence of synthetic focusing is to match the phase of the scattered signal to measured points spaced regularly on a plane. Many variations of synthetic focusing methods have already been developed for radars, ultrasonic testing applications, and microwave concealed weapon detection. Two synthetic focusing methods were investigated; namely, a) frequency-domain synthetic aperture focusing technique (FDSAFT), and b) wide-band microwave holography. These methods were applied towards materials whose defects were of low dielectric contrast like air void in SOFI. It is important to note that this investigation used relatively low frequencies from 8.2 GHz to 26.5 GHz that are not conducive for direct imaging of the SOFI. The ultimate goal of this work has been to demonstrate the capability of these methods before they are applied to much higher frequencies such as the millimeter wave frequency spectrum (e.g., 30-300 GHz).
Identifying explosives using broadband millimeter-wave imaging
NASA Astrophysics Data System (ADS)
Weatherall, James C.; Yam, Kevin; Barber, Jeffrey; Smith, Barry T.; Smith, Peter R.; Greca, Joseph
2017-05-01
Millimeter wave imaging is employed in Advanced Technology Imaging (AIT) systems to screen personnel for concealed explosives and weapons. AIT systems deployed in airports auto-detect potential threats by highlighting their location on a generic outline of a person using imaging data collected over a range of frequency. We show how the spectral information from the imaging data can be used to identify the composition of an anomalous object, in particular if it is an explosive material. The discriminative value of the technique was illustrated on military sheet explosive using millimeter-wave reflection data at frequencies 18 - 40 GHz, and commercial explosives using 2 - 18 GHz, but the free-space measurement was limited to a single horn with a large-area sample. This work extends the method to imaging data collected at high resolution with a 18 - 40 GHz imaging system. The identification of explosives is accomplished by extracting the dielectric constant from the free-space, multifrequency data. The reflection coefficient is a function of frequency because of propagation effects associated with the material's complex dielectric constant, which include interference from multiple reflections and energy loss in the sample. The dielectric constant is obtained by numerically fitting the reflection coefficient as a function of frequency to an optical model. In principal, the implementation of this technique in standoff imaging systems would allow threat assessment to be accomplished within the scope of millimeter-wave screening.
Mobile TNA system to detect explosives and drugs concealed in cars and trucks
NASA Astrophysics Data System (ADS)
Bendahan, Joseph; Gozani, Tsahi
1998-12-01
The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.
Imaging terahertz radar for security applications
NASA Astrophysics Data System (ADS)
Semenov, Alexei; Richter, Heiko; Böttger, Ute; Hübers, Heinz-Wilhelm
2008-04-01
Detection of concealed threats is a key issue in public security. In short range applications, passive imagers operating at millimeter wavelengths fulfill this task. However, for larger distances, they will suffer from limited spatial resolution. We will describe the design and performance of 0.8-THz imaging radar that is capable to detect concealed objects at a distance of more than 20 meter. The radar highlights the target with the built-in cw transmitter and analyses the returned signal making use of a heterodyne receiver with a single superconducting hot-electron bolometric mixer. With an integration time of 0.3 sec, the receiver distinguishes a temperature difference of 2 K at the 20 m distance. Both the transmitter and the receiver use the same modified Gregorian telescope consisting from two offset elliptic mirrors. The primary mirror defines limits the lateral resolution of the radar to 2 cm at 20 m distance. At this distance, the field of view of the radar has the diameter 0.5 m. It is sampled with a high-speed conical scanner that allows for a frame time less than 5 sec. The transmitter delivers to the target power with a density less than ten microwatt per squared centimeter, which is harmless for human beings. The radar implements a sensor fusion technique that greatly improves the ability to identify concealed objects.
Winograd, Michael R; Rosenfeld, J Peter
2014-12-01
In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity. Copyright © 2014 Elsevier B.V. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burns, Kimberly A.
2009-08-01
The accurate and efficient simulation of coupled neutron-photon problems is necessary for several important radiation detection applications. Examples include the detection of nuclear threats concealed in cargo containers and prompt gamma neutron activation analysis for nondestructive determination of elemental composition of unknown samples.
Using more different and more familiar targets improves the detection of concealed information.
Suchotzki, Kristina; De Houwer, Jan; Kleinberg, Bennett; Verschuere, Bruno
2018-04-01
When embedded among a number of plausible irrelevant options, the presentation of critical (e.g., crime-related or autobiographical) information is associated with a marked increase in response time (RT). This RT effect crucially depends on the inclusion of a target/non-target discrimination task with targets being a dedicated set of items that require a unique response (press YES; for all other items press NO). Targets may be essential because they share a feature - familiarity - with the critical items. Whereas irrelevant items have not been encountered before, critical items are known from the event or the facts of the investigation. Target items are usually learned before the test, and thereby made familiar to the participants. Hence, familiarity-based responding needs to be inhibited on the critical items and may therefore explain the RT increase on the critical items. This leads to the hypothesis that the more participants rely on familiarity, the more pronounced the RT increase on critical items may be. We explored two ways to increase familiarity-based responding: (1) Increasing the number of different target items, and (2) using familiar targets. In two web-based studies (n = 357 and n = 499), both the number of different targets and the use of familiar targets facilitated concealed information detection. The effect of the number of different targets was small yet consistent across both studies, the effect of target familiarity was large in both studies. Our results support the role of familiarity-based responding in the Concealed Information Test and point to ways on how to improve validity of the Concealed Information Test. Copyright © 2018 Elsevier B.V. All rights reserved.
Skitka, Linda J; Hanson, Brittany E; Wisneski, Daniel C
2017-02-01
People are more likely to become politically engaged (e.g., vote, engage in activism) when issues are associated with strong moral convictions. The goal of this research was to understand the underlying motivations that lead to this well-replicated effect. Specifically, to what extent is moralized political engagement motivated by proscriptive concerns (e.g., perceived harms, anticipated regret), prescriptive concerns (e.g., perceived benefits, anticipated pride), or some combination of these processes? And are the motivational pathways between moral conviction and political engagement the same or different for liberals and conservatives? Two studies (combined N = 2,069) found that regardless of political orientation, the association between moral conviction and political engagement was mediated by the perceived benefits of preferred but not the perceived harms of non-preferred policy outcomes, and by both anticipated pride and regret, findings that replicated in two contexts: legalizing same-sex marriage and allowing concealed weapons on college campuses.
Mechanical profiles of murder and murderers: An extensive review.
Kamaluddin, M R; Md Shariff, N S; Mat Saat, G A
2018-04-01
Murder is an extreme form of violent crime which occurs across all social, cultural, and ethnic spheres. It is therefore, crucial to understand the nature and the extent of mechanical profiles of murder and murderers. The purpose of this article is to review such critical aspects of murder in a nutshell. An archival research methodology was employed in this study where relevant search for literatures on these mechanical aspects related to murder was made across search engines such as Google Scholar and Elsevier with relevant articles selected for this review. This review discusses in an in-depth manner, pivotal mechanical profiles which include motives, methods of killing, choice of weapon, settings, targeted body parts, and murder victim concealment. In-depth understanding of each mechanical aspect offers an opportunity to the public at large to expand their knowledge on murder prevention manners which is vital for crime prevention efforts in the future.
PNNL Expert Doug McMakin Discusses Millimeter Wave Technology
McMakin, Doug
2018-02-13
Electrical Engineer Doug McMakin discusses Millimeter Wave Holographic technology, which uses non-harmful, ultrahigh-frequency radio waves to penetrate clothing to detect and identify concealed objects, as well as obtain accurate body measurements.
Remote sensing based on hyperspectral data analysis
NASA Astrophysics Data System (ADS)
Sharifahmadian, Ershad
In remote sensing, accurate identification of far objects, especially concealed objects is difficult. In this study, to improve object detection from a distance, the hyperspecral imaging and wideband technology are employed with the emphasis on wideband radar. As the wideband data includes a broad range of frequencies, it can reveal information about both the surface of the object and its content. Two main contributions are made in this study: 1) Developing concept of return loss for target detection: Unlike typical radar detection methods which uses radar cross section to detect an object, it is possible to enhance the process of detection and identification of concealed targets using the wideband radar based on the electromagnetic characteristics --conductivity, permeability, permittivity, and return loss-- of materials. During the identification process, collected wideband data is evaluated with information from wideband signature library which has already been built. In fact, several classes (e.g. metal, wood, etc.) and subclasses (ex. metals with high conductivity) have been defined based on their electromagnetic characteristics. Materials in a scene are then classified based on these classes. As an example, materials with high electrical conductivity can be conveniently detected. In fact, increasing relative conductivity leads to a reduction in the return loss. Therefore, metals with high conductivity (ex. copper) shows stronger radar reflections compared with metals with low conductivity (ex. stainless steel). Thus, it is possible to appropriately discriminate copper from stainless steel. 2) Target recognition techniques: To detect and identify targets, several techniques have been proposed, in particular the Multi-Spectral Wideband Radar Image (MSWRI) which is able to localize and identify concealed targets. The MSWRI is based on the theory of robust capon beamformer. During identification process, information from wideband signature library is utilized. The WB signature library includes such parameters as conductivity, permeability, permittivity, and return loss at different frequencies for possible materials related to a target. In the MSWRI approach, identification procedure is performed by calculating the RLs at different selected frequencies. Based on similarity of the calculated RLs and RL from WB signature library, targets are detected and identified. Based on the simulation and experimental results, it is concluded that the MSWRI technique is a promising approach for standoff target detection.
Krajčovič, Jozef; Janík, Martin; Novomeský, František; Straka, Lubomír; Hejna, Petr
2014-11-01
In forensic assessment, denial and concealment of pregnancy has wide-ranging implications including criminal abortions, extramural deliveries, concealment of birth, newborn infant abandonment or even neonaticide. Clarification of whether a newborn was born alive is the most important factor when evaluating an abandoned neonate or concealment of birth. Other points that need to be addressed are determination of viability and maturity of the newborn infant, and the identity of the mother. A prolonged postmortem interval following illegal disposal of a dead body often leads to advanced decomposition, making postmortem elucidation difficult. We report an exceptionally uncommon autopsy case of a well-preserved female newborn, which was accidentally found after eight years in a home freezer. Despite the prolonged postmortem interval, tissue preservation was sufficient for a meaningful autopsy including a comprehensive histopathological study. The purpose of the present investigations was to expand our understanding of thanatological processes, as well as detectability of particular histological findings on the remains of a newborn after extremely prolonged storage in an artificially frozen environment. In addition, this article discusses forensically important issues regarding concealment of newborn infant under specific conditions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Current Research and Potential Applications of the Concealed Information Test: An Overview
Ben-Shakhar, Gershon
2012-01-01
Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the concealed information test (CIT), designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity (based on a recent meta-analytic study), will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution) will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made. PMID:23060826
Tracking the truth: the effect of face familiarity on eye fixations during deception.
Millen, Ailsa E; Hope, Lorraine; Hillstrom, Anne P; Vrij, Aldert
2017-05-01
In forensic investigations, suspects sometimes conceal recognition of a familiar person to protect co-conspirators or hide knowledge of a victim. The current experiment sought to determine whether eye fixations could be used to identify memory of known persons when lying about recognition of faces. Participants' eye movements were monitored whilst they lied and told the truth about recognition of faces that varied in familiarity (newly learned, famous celebrities, personally known). Memory detection by eye movements during recognition of personally familiar and famous celebrity faces was negligibly affected by lying, thereby demonstrating that detection of memory during lies is influenced by the prior learning of the face. By contrast, eye movements did not reveal lies robustly for newly learned faces. These findings support the use of eye movements as markers of memory during concealed recognition but also suggest caution when familiarity is only a consequence of one brief exposure.
Asha, Stephen Edward; Cooke, Andrew
2015-09-01
Suspected body packers may be brought to emergency departments (EDs) close to international airports for abdominal computed tomography (CT) scanning. Senior emergency clinicians may be asked to interpret these CT scans. Missing concealed drug packages have important clinical and forensic implications. The accuracy of emergency clinician interpretation of abdominal CT scans for concealed drugs is not known. Limited evidence suggests that accuracy for identification of concealed packages can be increased by viewing CT images on "lung window" settings. To determine the accuracy of senior emergency clinicians in interpreting abdominal CT scans for concealed drugs, and to determine if this accuracy was improved by viewing scans on both abdominal and lung window settings. Emergency clinicians blinded to all patient identifiers and the radiology report interpreted CT scans of suspected body packers using standard abdominal window settings and then with the addition of lung window settings. The reference standard was the radiologist's report. Fifty-five emergency clinicians reported 235 CT scans. The sensitivity, specificity, and accuracy of interpretation using abdominal windows was 89.9% (95% confidence interval [CI] 83.0-94.7), 81.9% (95% CI 73.7-88.4), and 86.0% (95% CI 81.5-90.4), respectively, and with both window settings was 94.1% (95% CI 88.3-97.6), 76.7% (95% CI 68.0-84.1), 85.5% (95% CI 81.0-90.0), respectively. Diagnostic accuracy was similar regardless of the clinician's experience. Interrater reliability was moderate (kappa 0.46). The accuracy of interpretation of abdominal CT scans performed for the purpose of detecting concealed drug packages by emergency clinicians is not high enough to safely discharge these patients from the ED. The use of lung windows improved sensitivity, but at the expense of specificity. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.
Terahertz imaging systems: a non-invasive technique for the analysis of paintings
NASA Astrophysics Data System (ADS)
Fukunaga, K.; Hosako, I.; Duling, I. N., III; Picollo, M.
2009-07-01
Terahertz (THz) imaging is an emerging technique for non-invasive analysis. Since THz waves can penetrate opaque materials, various imaging systems that use THz waves have been developed to detect, for instance, concealed weapons, illegal drugs, and defects in polymer products. The absorption of THz waves by water is extremely strong, and hence, THz waves can be used to monitor the water content in various objects. THz imaging can be performed either by transmission or by reflection of THz waves. In particular, time domain reflection imaging uses THz pulses that propagate in specimens, and in this technique, pulses reflected from the surface and from the internal boundaries of the specimen are detected. In general, the internal structure is observed in crosssectional images obtained using micro-specimens taken from the work that is being analysed. On the other hand, in THz time-domain imaging, a map of the layer of interest can be easily obtained without collecting any samples. When realtime imaging is required, for example, in the investigation of the effect of a solvent or during the monitoring of water content, a THz camera can be used. The first application of THz time-domain imaging in the analysis of a historical tempera masterpiece was performed on the panel painting Polittico di Badia by Giotto, of the permanent collection of the Uffizi Gallery. The results of that analysis revealed that the work is composed of two layers of gypsum, with a canvas between these layers. In the paint layer, gold foils covered by paint were clearly observed, and the consumption or ageing of gold could be estimated by noting the amount of reflection. These results prove that THz imaging can yield useful information for conservation and restoration purposes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kercel, S.W.; Baylor, V.M.; Labaj, L.E.
Enclosed Space Detection System (ESDS) is a fast, inexpensive, and reliable device for detecting human occupants hidden in vehicles. Operation requires less than two minutes. ESDS is used to foil attempts at smuggling illegal aliens, terrorists, and escaping prisoners. It is being tested at nuclear weapons facilities and has been operated at several prisons and international border crossings. ESDS is the first practical electronic alternative to physical searches of vehicles for hidden passengers. At critical checkpoints, a thorough physical search of a single fully loaded truck requires a team of from two to six people, and may take as longmore » as eight hours. Despite this level of security, experience has shown that the search can occasionally be foiled. Due to the enormous time and expense of thorough physical searches of vehicles, they are seldom conducted at any but the most critical of locations, simply leaving many sites vulnerable to crime and terrorism. Prior to the development of the ESDS, the only other effective alternative to physical search was the use of specially-trained canines, which can be vastly superior to the physical search in both time and accuracy. However, as discussed in this paper, canine inspection is not really a competitive substitute for ESDS because canine reliability (80% at most) is not as high as that of the ESDS (99%+), while the costs, training requirements, and operator skill needed are significantly higher with canines than with the ESDS. In addition, the ESDS has straightforward self-diagnostic tests to ensure the system is operating correctly; such tests are not currently available with either canine or human inspectors. ESDS offers an attractive supplement or alternative to meet current security requirements for vehicle searches at portals at government, nuclear, industrial, and other facilities where concealed persons may pose a threat either by entering or leaving.« less
Detecting Chemical Weapons: Threats, Requirements, Solutions, and Future Challenges
NASA Astrophysics Data System (ADS)
Boso, Brian
2011-03-01
Although chemicals have been reportedly used as weapons for thousands of years, it was not until 1915 at Ypres, France that an industrial chemical, chlorine, was used in World War I as an offensive weapon in significant quantity, causing mass casualties. From that point until today the development, detection, production and protection from chemical weapons has be an organized endeavor of many of the world's armed forces and in more recent times, non-governmental terrorist organizations. The number of Chemical Warfare Agents (CWAs) has steadily increased as research into more toxic substances continued for most of the 20 th century. Today there are over 70 substances including harassing agents like tear gas, incapacitating agents, and lethal agents like blister, blood, chocking, and nerve agents. The requirements for detecting chemical weapons vary depending on the context in which they are encountered and the concept of operation of the organization deploying the detection equipment. The US DoD, for example, has as a requirement, that US forces be able to continue their mission, even in the event of a chemical attack. This places stringent requirements on detection equipment. It must be lightweight (<2 lbs), detect a large array of chemical warfare agents and toxic industrial chemicals, detect and warn at concentration levels and time duration to prevent acute health effects, meet military ruggedness specifications and work over a wide range of temperature and humidity, and have a very high probability of detection with a similarly low probability of false positives. The current technology of choice to meet these stringent requirements is Ion Mobility Spectrometry. Many technologies are capable of detecting chemicals at the trace levels required and have been extensively developed for this application, including, but not limited to: mass spectroscopy, IR spectroscopy, RAMAN spectroscopy, MEMs micro-cantilever sensors, surface acoustic wave sensors, differential mobility spectrometry, and amplifying fluorescence polymers. In the future the requirements for detection equipment will continue to become even more stringent. The continuing increase in the sheer number of threats that will need to be detected, the development of binary agents requiring that even the precursor chemicals be detected, the development of new types of agents unlike any of the current chemistries, and the expansion of the list of toxic industrial chemical will require new techniques with higher specificity and more sensitivity.
NASA Astrophysics Data System (ADS)
A. AL-Salhi, Yahya E.; Lu, Songfeng
2016-08-01
Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.
Self-Concealment and Suicidal Behaviors
ERIC Educational Resources Information Center
Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.
2012-01-01
Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…
Prokofieva, D S; Shmurak, V I; Sadovnikov, S V; Gontcharov, N V
2015-01-01
The article covers problems of biochemical methods assessing organophosphorus toxic compounds in objects of chemical weapons extinction. The authors present results of works developing new, more specific and selective biochemical methods.
Scope and verification of a Fissile Material (Cutoff) Treaty
von Hippel, Frank N.
2014-01-01
A Fissile Material Cutoff Treaty (FMCT) would ban the production of fissile material – in practice highly-enriched uranium and separated plutonium – for weapons. It has been supported by strong majorities in the United Nations. After it comes into force, newly produced fissile materials could only be produced under international – most likely International Atomic Energy Agency – monitoring. There are many non-weapon states that argue the treaty should also place under safeguards pre-existing stocks of fissile material in civilian use or declared excess for weapons so as to make nuclear-weapons reductions irreversible. Our paper discusses the scope of themore » FMCT, the ability to detect clandestine production and verification challenges in the nuclear-weapons states.« less
Detection Technology in the 21st Century: The Case of Nuclear Weapons of Mass Destruction
2008-03-26
Weapons of Mass Destruction FORMAT : Strategy Research Project DATE: 26 March 2008 WORD COUNT: 6,764 PAGES: 25 KEY TERMS: National Security, Deterrence...stocks remaining in Ukraine, Belarus, Uzbekistan, and other former Soviet and Eastern European states, and the unknown amounts of highly enriched uranium ...detect emissions from the decay of radioactive nuclides, which can occur naturally, such as uranium and thorium, or are manmade, such as plutonium
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burrows, T.A.; Thoma, P.J.
Two types of ion-mobility detectors were evaluated in both laboratory and field tests. Laboratory test results show that these detectors are highly sensitive to dynamite and pistol powder and have good false-alarm agent rejection. Field tests of these two detectors revealed that they would detect dynamite and Ball-C-Propellent in free air. However, neither of the ion-mobility detectors would detect these explosives if the explosives were concealed.
Environmental Detection of Clandestine Nuclear Weapon Programs
NASA Astrophysics Data System (ADS)
Kemp, R. Scott
2016-06-01
Environmental sensing of nuclear activities has the potential to detect nuclear weapon programs at early stages, deter nuclear proliferation, and help verify nuclear accords. However, no robust system of detection has been deployed to date. This can be variously attributed to high costs, technical limitations in detector technology, simple countermeasures, and uncertainty about the magnitude or behavior of potential signals. In this article, current capabilities and promising opportunities are reviewed. Systematic research in a variety of areas could improve prospects for detecting covert nuclear programs, although the potential for countermeasures suggests long-term verification of nuclear agreements will need to rely on methods other than environmental sensing.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Voytchev, M; Radev, R; Chiaro, P
The International Electrotechnical Commission (IEC) is the leading and oldest global organization with over 100 years history of developing and publishing international standards for all electrical, electronic and related technologies, including radiation detection instrumentation. Subcommittee 45B 'Radiation Protection Instrumentation' of the IEC has recently started the development of two standards on radiation-generating devices. IEC 62463 'Radiation protection instrumentation--X-ray Systems for the Screening of Persons for Security and the Carrying of Illicit Items' is applicable to X-ray systems designed for screening people to detect if they are carrying objects such as weapons, explosives, chemical and biological agents and other concealed itemsmore » that could be used for criminal purposes, e.g. terrorist use, drug smuggling, etc. IEC 62523 'Radiation protection instrumentation--Cargo/Vehicle radiographic inspection systems' applies to cargo/vehicle imaging inspection systems using accelerator produced X-ray or gamma radiation to obtain images of the screened objects (e.g. cargo containers, transport and passenger vehicles and railroad cars). The objective of both standards is to specify standard requirements and general characteristics and test procedures, as well as, radiation, electrical, environmental, mechanical, and safety requirements and to provide examples of acceptable methods to test these requirements. In particular the standards address the design requirements as they relate to the radiation protection of the people being screened, people who are in the vicinity of the equipment and the operators. The standard IEC 62463 does not deal with the performance requirements for the quality of the object detection. Compliance with the standards requirements will provide the manufacturers with internationally acceptable specifications and the device users with assurance of the rigorous quality and accuracy of the measurements in relation to the radiological safety of the equipment. The main characteristics of IEC 62463 and IEC 62523 standards are presented and as well as the IEC methodology of standard development and approval.« less
Elbasuney, Sherif; El-Sherif, Ashraf F
2017-01-01
The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Visualizing the mesothoracic spiracles in a bark beetle: The coffee berry borer, Hypothenemus hampei
USDA-ARS?s Scientific Manuscript database
In a low-temperature scanning electron microscopy study aimed at determining whether the coffee berry borer (Hypothenemus hampei (Ferrari); Coleoptera: Curculionidae: Scolytinae) possesses mycangia, we fortuitously detected the mesothoracic spiracles, which are usually concealed. The mesothoracic s...
Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.
2010-01-01
Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312
Social control of unreliable signals of strength in male but not female crayfish, Cherax destructor.
Walter, Gregory M; van Uitregt, Vincent O; Wilson, Robbie S
2011-10-01
The maintenance of unreliable signals within animal populations remains a highly controversial subject in studies of animal communication. Crustaceans are an ideal group for studying unreliable signals of strength because their chela muscles are cryptically concealed beneath an exoskeleton, making it difficult for competitors to visually assess an opponent's strength. In this study, we examined the importance of social avenues for mediating the possible advantages gained by unreliable signals of strength in crustaceans. To do this, we investigated the factors that determine social dominance and the relative importance of signalling and fighting during aggressive encounters in male and female freshwater crayfish, Cherax destructor. Like other species of crayfish, we expected substantial variation in weapon force for a given weapon size, making the assessment of actual fighting ability of an opponent difficult from signalling alone. In addition, we expected fighting would be used to ensure that individuals that are weak for their signal (i.e. chela) size would not achieve higher than expected dominance. For both male and female C. destructor, we found large variation in the actual force of their chela for any given weapon size, indicating that it is difficult for competitors to accurately assess an opponent's force on signal size alone. For males, these unreliable signals of strength were controlled socially through increased levels of fighting and a decreased reliance on signalling, thus directly limiting the benefits accrued to individuals employing high-quality signals (large chelae) with only low resource holding potential. However, in contrast to our predictions, we found that females primarily relied on signalling to settle disputes, resulting in unreliable signals of strength being routinely used to establish dominance. The reliance by females on unreliable signals to determine dominance highlights our poor current understanding of the prevalence and distribution of dishonesty in animal communication.
Navy Acquisition: Development of the AN/BSY-1 Combat System
1992-01-01
AN/BSY-1, a computer-based combat system, is designed to detect, classify, track, and launch weapons at enemy surface, subsurface, and land targets. The Navy expects the AN/BSY-1 system to locate targets sooner than previous systems, allow operators to perform multiple tasks and address multiple targets concurrently, and reduce the time between detecting a target and launching weapons. The Navy has contracted with the International Business Machines (IBM) Corporation for 23 AN/BSY-1 systems, maintenance and operational trainers, and a software
The nest-concealment hypothesis: New insights from a comparative analysis
Borgmann, Kathi L.; Conway, Courtney J.
2015-01-01
Selection of a breeding site is critical for many animals, especially for birds whose offspring are stationary during development. Thus, birds are often assumed to prefer concealed nest sites. However, 74% of studies (n = 106) that have evaluated this relationship for open-cup nesting songbirds in North America failed to support the nest-concealment hypothesis. We conducted a comparative analysis to identify factors that contribute to variation in the ability of researchers to find support for the nest-concealment hypothesis. We found that some of the discrepancy among studies can be explained by interspecific differences in morphological and extrinsic factors that affect nest predation. Moreover, methods that investigators used to estimate concealment affected whether studies found support for the nest-concealment hypothesis; 33% of the studies that used quantitative estimates found support for the nest-concealment hypothesis whereas only 10% of the studies that used qualitative estimates found support. The timing of measurements also explained some of the ambiguity; studies that provided little information regarding the timing of their foliage density estimates were less likely to support the nest-concealment hypothesis. Species with more conspicuous male plumage were less likely to support the nest-concealment hypothesis when we analyzed studies that used visual estimates. Whereas species with more conspicuous female plumage were more likely to support the nest-concealment hypothesis when we analyzed studies that used quantitative measures. Our results demonstrate that support for the nest-concealment hypothesis has been equivocal, but that some of the ambiguity can be explained by morphological traits and methods used to measure concealment.
Applying Science and Technology to Combat WMD Terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wuest, C R; Werne, R W; Colston, B W
2006-05-04
Lawrence Livermore National Laboratory (LLNL) is developing and fielding advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons. The science, technology, and integrated systems we provide are informed by and developed with key partners and end users. LLNL's long-standing role as one of the two principle U.S. nuclear weapons design laboratories has led to significant resident expertise for health effects of exposure to radiation, radiation detection technologies, characterization of radioisotopes, and assessment and response capabilities for terrorist nuclear weapons use. This papermore » provides brief overviews of a number of technologies developed at LLNL that are being used to address national security needs to confront the growing threats of CBRNE terrorism.« less
Applying science and technology to combat WMD terrorism
NASA Astrophysics Data System (ADS)
Wuest, Craig R.; Werne, Roger W.; Colston, Billy W.; Hartmann-Siantar, Christine L.
2006-05-01
Lawrence Livermore National Laboratory (LLNL) is developing and fielding advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical, biological, radiological, nuclear, and explosive (CBRNE) weapons. The science, technology, and integrated systems we provide are informed by and developed with key partners and end users. LLNL's long-standing role as one of the two principle U.S. nuclear weapons design laboratories has led to significant resident expertise for health effects of exposure to radiation, radiation detection technologies, characterization of radioisotopes, and assessment and response capabilities for terrorist nuclear weapons use. This paper provides brief overviews of a number of technologies developed at LLNL that are being used to address national security needs to confront the growing threats of CBRNE terrorism.
Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests☆
Bergström, Zara M.; Anderson, Michael C.; Buda, Marie; Simons, Jon S.; Richardson-Klavehn, Alan
2013-01-01
Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals’ intentional control and place limits on their use in legal settings. PMID:23664804
Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young
2018-05-11
In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.
Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.
1992-01-01
Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb-rich base-metal veins, and sedimentary country rocks. Stream-sediment anomalies detected using oxalic acid leaches can be evaluated using Pb isotope analysesof selected geochemical anomalies. Such an evaluation procedure, given regional target Pb isotope signatures for concealed mineralization, can greatly reduce the cost of exploration for undiscovered ore deposits concealed beneath barren overburden. Lead isotope measurements on aliquots of the same solutions showed that ICP-MS determinations are of low precision and vary non-systematically when compared with the Pb isotope values of the higher precision thermal ionization method. These variations and lower precision of the ICP-MS measurements are attributed to matrix effects. ?? 1992.
An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.
Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud
2016-01-01
We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P < .001). Ratings of isolation stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.
Concealment of sexual orientation.
Sylva, David; Rieger, Gerulf; Linsenmeier, Joan A W; Bailey, J Michael
2010-02-01
Sex-atypical behaviors may be used to identify a person as homosexual. To shield themselves from prejudice, homosexual people may attempt to conceal these behaviors. It is not clear how effectively they can do so. In Study 1, we asked homosexual participants to conceal their sex-atypical behaviors while talking about the weather. Raters watched videos of the participants and judged the likelihood that each participant was homosexual. Homosexual participants were able to partially conceal signs of their orientation, but they remained distinguishable from heterosexual participants. In Study 2, we tested the ability to conceal signs of one's sexual orientation in a more demanding situation: a mock job interview. In this scenario, homosexual men were even less effective at concealing their orientation. Higher cognitive demands in this new situation may have interfered with their ability to conceal.
Laser countermeasures for commercial airlines
NASA Astrophysics Data System (ADS)
Keirstead, Burt
2005-05-01
Since the attempted shoot down of an Israeli airliner departing from Mombasa, Kenya in November of 2002, there has been heightened concern that Al Qaeda, or other terrorist factions, will use shoulder-fired heat seeking missiles as part of their tactics. These weapons, known more formally as man-portable air defense systems, or MANPADS, have been widely proliferated, are easy to conceal and deploy, and can be purchased on the black market for as little as $10,000. Recognizing that MANPADS pose a potential threat to commercial airplanes throughout the world, the Department of Homeland Security (DHS) is executing a system design and development (SDD) program to evaluate the viability of missile countermeasures that would be installed on commercial airplanes. This paper provides an overview of the MANPADS threat, a discussion of associated countermeasure requirements for systems installed on commercial airplanes, and a description of a laser countermeasure system that is being prototyped and demonstrated as part of the DHS Counter-MANPADS program.
The use of geoscience methods for terrestrial forensic searches
NASA Astrophysics Data System (ADS)
Pringle, J. K.; Ruffell, A.; Jervis, J. R.; Donnelly, L.; McKinley, J.; Hansen, J.; Morgan, R.; Pirrie, D.; Harrison, M.
2012-08-01
Geoscience methods are increasingly being utilised in criminal, environmental and humanitarian forensic investigations, and the use of such methods is supported by a growing body of experimental and theoretical research. Geoscience search techniques can complement traditional methodologies in the search for buried objects, including clandestine graves, weapons, explosives, drugs, illegal weapons, hazardous waste and vehicles. This paper details recent advances in search and detection methods, with case studies and reviews. Relevant examples are given, together with a generalised workflow for search and suggested detection technique(s) table. Forensic geoscience techniques are continuing to rapidly evolve to assist search investigators to detect hitherto difficult to locate forensic targets.
Student attitudes toward concealed handguns on campus at 2 universities.
Cavanaugh, Michael R; Bouffard, Jeffrey A; Wells, William; Nobles, Matt R
2012-12-01
We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying.
Student Attitudes Toward Concealed Handguns on Campus at 2 Universities
Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.
2012-01-01
We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763
Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products
2012-01-01
Industrial Compounds in Personal Care Products . Consumer products such as personal care and cosmetics present a challenge. Commonly these products... personal care products are also colored and present fluorescence, obscuring the persistent Raman signatures. The spectra of a perfume is shown in Figure
Computer Viruses: Prevention, Detection, and Treatment
1990-03-12
executed, also carries out its covert function, potentially undetected. This class of attack earned the term "Trojan horse" from the original of Greek ... mythology , signifying a gift which conceals a malicious purpose. 1 cause harm. The offending code may be present in a code segment the user "touches," which
Hoy-Ellis, Charles P.
2016-01-01
Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654
Classification-Based Spatial Error Concealment for Visual Communications
NASA Astrophysics Data System (ADS)
Chen, Meng; Zheng, Yefeng; Wu, Min
2006-12-01
In an error-prone transmission environment, error concealment is an effective technique to reconstruct the damaged visual content. Due to large variations of image characteristics, different concealment approaches are necessary to accommodate the different nature of the lost image content. In this paper, we address this issue and propose using classification to integrate the state-of-the-art error concealment techniques. The proposed approach takes advantage of multiple concealment algorithms and adaptively selects the suitable algorithm for each damaged image area. With growing awareness that the design of sender and receiver systems should be jointly considered for efficient and reliable multimedia communications, we proposed a set of classification-based block concealment schemes, including receiver-side classification, sender-side attachment, and sender-side embedding. Our experimental results provide extensive performance comparisons and demonstrate that the proposed classification-based error concealment approaches outperform the conventional approaches.
Future of clip-on weapon sights: pros and cons from an applications perspective
NASA Astrophysics Data System (ADS)
Knight, C. Reed; Greenslade, Ken; Francisco, Glen
2015-05-01
US Domestic, International, allied Foreign National Warfighters and Para-Military First Responders (Police, SWAT, Special Operations, Law Enforcement, Government, Security and more) are put in harm's way all the time. To successfully complete their missions and return home safely are the primary goals of these professionals. Tactical product improvements that affect mission effectiveness and solider survivability are pivotal to understanding the past, present and future of Clip-On in-line weapon sights. Clip-On Weapon Sight (WS) technology was deemed an interim solution by the US Government for use until integrated and fused (day/night multi-sensor) Weapon Sights (WSs) were developed/fielded. Clip-On has now become the solution of choice by Users, Warriors, Soldiers and the US Government. SWaP-C (size, weight and power -cost) has been improved through progressive advances in Clip-On Image Intensified (I2), passive thermal, LL-CMOS and fused technology. Clip-On Weapon Sights are now no longer mounting position sensitive. Now they maintain aim point boresight, so they can be used for longer ranges with increased capabilities while utilizing the existing zeroed weapon and daysight optic. Active illuminated low-light level (both analog I2 and digital LL-CMOS) imaging is rightfully a real-world technology, proven to deliver daytime and low-light level identification confidence. Passive thermal imaging is also a real-world technology, proven to deliver daytime, nighttime and all-weather (including dirty battlefield) target detection confidence. Image processing detection algorithms with intelligent analytics provide documented promise to improve confidence by reducing Users, Warriors and Soldiers' work-loads and improving overall system engagement solution outcomes. In order to understand the future of Clip-On in-line weapon sights, addressing pros and cons, this paper starts with an overview of historical weapon sight applications, technologies and stakeholder decisions driving milestone events that helped shape the Clip-On weapon sight industry. Then, this paper systematically reviews current attributes of integrated multispectral wavelength electro-optical imaging systems that successfully (and sometimes unsuccessfully) shape today's Warrior, Soldier and User's net-capabilities. Finally, this paper explores the evolution, pros and cons, of future Clip-On weapon sights, from a manufacturing and real world applications perspective for tomorrow's military soldier and paramilitary first responder.
Mental Layouts of Concealed Objects as a Function of Bizarre Imagery and Retention Interval.
ERIC Educational Resources Information Center
Iaccino, James; And Others
To determine whether concealed imagery was an effective mnemonic aid in the recall of paired objects, two studies were conducted with explicitly worded instructions to conceal targets and with variable image formation periods. In each study, 40 subjects were presented with counterbalanced verbal descriptions of Concealed, Pictorial, and Separate…
Mapping Fearscapes of a Mammalian Herbivore using Terrestrial LiDAR and UAV Imagery
NASA Astrophysics Data System (ADS)
Olsoy, P.; Nobler, J. D.; Forbey, J.; Rachlow, J. L.; Burgess, M. A.; Glenn, N. F.; Shipley, L. A.
2013-12-01
Concealment allows prey animals to remain hidden from a predator and can influence both real and perceived risks of predation. The heterogeneous nature of vegetative structure can create a variable landscape of concealment - a 'fearscape' - that may influence habitat quality and use by prey. Traditional measurements of concealment rely on a limited number of distances, heights, and vantage points, resulting in small snapshots of concealment available to a prey animal. Our objective was to demonstrate the benefits of emerging remote sensing techniques to map fearscapes for pygmy rabbits (Brachylagus idahoensis) in sagebrush steppe habitat across a continuous range of scales. Specifically, we used vegetation height rasters derived from terrestrial laser scanning (TLS) to create viewsheds from multiple vantage points, representing predator visibility. The sum of all the viewsheds modeled horizontal concealment of prey at both the shrub and patch scales. We also used a small, unmanned aerial vehicle (UAV) to determine vertical concealment at a habitat scale. Terrestrial laser scanning provided similar estimates of horizontal concealment at the shrub scale when compared to photographic methods (R2 = 0.85). Both TLS and UAV provide the potential to quantify concealment of prey from multiple distances, heights, or vantage points, allowing the creation of a manipulable fearscape map that can be correlated with habitat use by prey animals. The predictive power of such a map also could identify shrubs or patches for fine scale nutritional and concealment analysis for future investigation and conservation efforts. Fearscape map at the mound-scale. Viewsheds were calculated from 100 equally spaced observer points located 4 m from the closest on-mound sagebrush of interest. Red areas offer low concealment, while green areas provide high concealment.
Using Wireless Sensor Networks in Improvised Explosive Device Detection
2007-12-01
data collection (permitting self - healing when a node failure occurs); Sensor nodes Gateway nodes 24 • Energy efficiency (necessary to maintain...Runner” robotic platform (see Figure 1). It is reported that this system can detect a wide range of IEDs, even those concealed in vehicles. However...be as simple as running over a rubber hose to produce enough air pressure to activate a switch. Some IEDs have been remotely detonated with radio
Study and application of new Raman spectroscopy
NASA Astrophysics Data System (ADS)
Liu, Qiushi; Zhang, Xiaohua
2016-03-01
Spatially Offset Raman Spectroscopy (SORS) is a new type of Raman Spectroscopy technology, which can detect the medium concealed in the opaque or sub-transparent material fast and nondestructively. The article summarized Spatially Offset Raman Spectroscopy`s international and domestic study and application progress on contraband detecting, medical science (bone ingredient, cancer diagnose etc.), agricultural products, historical relic identification etc. and stated the technology would become an effective measurement which had wide application prospect.
Multi-Source Fusion for Explosive Hazard Detection in Forward Looking Sensors
2016-12-01
include; (1) Investigating (a) thermal, (b) synthetic aperture acoustics ( SAA ) and (c) voxel space Radar for buried and side threat attacks. (2...detection. (3) With respect to SAA , we developed new approaches in the time and frequency domains for analyzing signature of concealed targets (called...Fraz). We also developed a method to extract a multi-spectral signature from SAA and deep learning was used on limited training and class imbalance
NASA Astrophysics Data System (ADS)
Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas
2016-05-01
We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.
Zeichner, A
2001-11-01
Experiments were carried out to assess the danger of concealing GSR particles by skin debris using the tape-lift method for sampling GSR from hands. Thirty discrete spherical particles (from GSR and from the debris of oxygen cutting of steel) sized from 8 to 30 microns were mounted on a double-side adhesive coated stubs in known locations using a stereomicroscope. These stubs were then used for dabbing hands 50 times. Some of the particles or parts thereof were covered by skin flakes, however, all particles could be detected using the backscattered electron image (BEI) in the scanning electron microscope (SEM). Also, all could be identified by the energy dispersive X-ray spectroscopy (EDX).
Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits
NASA Astrophysics Data System (ADS)
Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.
2016-05-01
An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.
Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.
Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan
2015-12-01
People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.
The United States Army 1996 Modernization Plan.
1996-03-08
and a cadre of operations, intelligence, fire support, air defense, and nuclear, biological, and chemical warfare personnel. As required, ARSPACE will...aerial and stand-off chemical and biological detection systems. " Decontamination improvements include Modular Decontamination System fielding in the near... Chemical . As many as 25 nations are producing and stockpiling chemical weapons. Weapons systems from mortars to missiles can deliver chemical warfare (CW
Attachment style, self-concealment, and interpersonal distance among Japanese undergraduates.
Yukawa, Shintaro; Tokuda, Hideji; Sato, Jun
2007-06-01
The relationships among attachment style, self-concealment, and interpersonal distance were studied with 71 Japanese undergraduates (33 men and 38 women, ages 18 to 20 years, M = 18.7, SD= .6). Participants completed a questionnaire about Self-concealment and Attachment Styles (Secure, Anxious, and Avoidant). One week later, Interpersonal Distance, which individuals maintain between themselves and others, was measured by the stop-distance paradigm. Analysis showed that scores for more Anxious and Avoidant Attachment Styles were positively correlated with those for greater Self-concealment. Scores for greater Self-concealment and more Anxious Attachment Style were also correlated with longer Interpersonal Distance.
Using natural beta emission for detecting concealed tobacco in parcels
NASA Astrophysics Data System (ADS)
Myers, Jeremy; Hussein, Esam M. A.
2007-10-01
It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in 40K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials.
Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E
2016-07-27
Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.
Hu, Xiaoqing; Pornpattananangkul, Narun; Rosenfeld, J Peter
2013-05-01
In an event-related potential (ERP)-based concealed information test (CIT), we investigated the effect of manipulated awareness of concealed information on the ERPs. Participants either committed a mock crime or not (guilty vs. innocent) before the CIT, and received feedback regarding either specific (high awareness) or general (low awareness) task performance during the CIT. We found that awareness and recognition of the crime-relevant information differentially influenced the frontal-central N200 and parietal P300: Probe elicited a larger N200 than irrelevant only when guilty participants were in the high awareness condition, whereas the P300 was mainly responsive to information recognition. No N200-P300 correlation was found, allowing for a combined measure of both yielding the highest detection efficiency in the high awareness group (AUC = .91). Finally, a color-naming Stroop task following the CIT revealed that guilty participants showed larger interference effects than innocent participants, suggesting that the former expended more attentional resources during the CIT. Copyright © 2013 Society for Psychophysiological Research.
Radiological and practical aspects of body packing
Reginelli, A; Pinto, F; Sica, G; Scaglione, M; Berger, F H; Romano, L; Brunese, L
2014-01-01
Body packing represents the concealment of illegal substances in a person's body with the aim of smuggling. “Body packers” either swallow drug-filled packets or introduce drug-filled packets into their bodies rectally or vaginally with the purpose of concealing them. The three main smuggled drugs are cocaine, heroin and cannabis products. Body packing represents a serious risk of acute narcotic toxicity from drug exposure, intestinal obstruction owing to pellet impaction and bowel perforation with consequent abdominal sepsis. A suspected body packer is generally admitted to hospital to perform imaging investigations and confirm the presence of drugs in his/her body. Radiological imaging methods are essential to diagnose body packing and to detect potential complications. Increasing sophistication of traffickers and improvements in packaging add to the detection difficulty. Radiologists should be aware of the appearance of drug packets in a range of imaging modalities. This article informs physicians about the challenging aspects of body packing, its background and medicolegal issues, what imaging methods can be used and what criteria are necessary to perform a correct diagnosis. PMID:24472727
Condition-Dependent Trade-Off Between Weapon Size and Immunity in Males of the European Earwig.
Körner, Maximilian; Vogelweith, Fanny; Foitzik, Susanne; Meunier, Joël
2017-08-11
Investigating the expression of trade-offs between key life-history functions is central to our understanding of how these functions evolved and are maintained. However, detecting trade-offs can be challenging due to variation in resource availability, which masks trade-offs at the population level. Here, we investigated in the European earwig Forficula auricularia whether (1) weapon size trades off with three key immune parameters - hemocyte concentration, phenoloxidase and prophenoloxidase activity - and whether (2) expression and strength of these trade-offs depend on male body condition (body size) and/or change after an immune challenge. Our results partially confirmed condition dependent trade-offs between weapon size and immunity in male earwigs. Specifically, we found that after an immune challenge, weapon size trades off with hemocyte concentrations in low-condition, but not in good-condition males. Contrastingly, weapon size was independent of pre-challenge hemocyte concentration. We also found no trade-off between weapon size and phenoloxidase activity, independent of body condition and immune challenge. Overall, our study reveals that trade-offs with sexual traits may weaken or disappear in good-condition individuals. Given the importance of weapon size for male reproductive success, our results highlight how low-condition individuals may employ alternative life-history investment strategies to cope with resource limitation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Luke, S J
2011-12-20
This report describes a path forward for implementing information barriers in a future generic biological arms-control verification regime. Information barriers have become a staple of discussion in the area of arms control verification approaches for nuclear weapons and components. Information barriers when used with a measurement system allow for the determination that an item has sensitive characteristics without releasing any of the sensitive information. Over the last 15 years the United States (with the Russian Federation) has led on the development of information barriers in the area of the verification of nuclear weapons and nuclear components. The work of themore » US and the Russian Federation has prompted other states (e.g., UK and Norway) to consider the merits of information barriers for possible verification regimes. In the context of a biological weapons control verification regime, the dual-use nature of the biotechnology will require protection of sensitive information while allowing for the verification of treaty commitments. A major question that has arisen is whether - in a biological weapons verification regime - the presence or absence of a weapon pathogen can be determined without revealing any information about possible sensitive or proprietary information contained in the genetic materials being declared under a verification regime. This study indicates that a verification regime could be constructed using a small number of pathogens that spans the range of known biological weapons agents. Since the number of possible pathogens is small it is possible and prudent to treat these pathogens as analogies to attributes in a nuclear verification regime. This study has determined that there may be some information that needs to be protected in a biological weapons control verification regime. To protect this information, the study concludes that the Lawrence Livermore Microbial Detection Array may be a suitable technology for the detection of the genetic information associated with the various pathogens. In addition, it has been determined that a suitable information barrier could be applied to this technology when the verification regime has been defined. Finally, the report posits a path forward for additional development of information barriers in a biological weapons verification regime. This path forward has shown that a new analysis approach coined as Information Loss Analysis might need to be pursued so that a numerical understanding of how information can be lost in specific measurement systems can be achieved.« less
Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.
Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon
2016-01-01
Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.
The bioscience revolution & the biological weapons threat: levers & interventions
D'Agostino, Mark; Martin, Greg
2009-01-01
In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level. PMID:19220910
The Task of Detecting Illicit Nuclear Material: Status and Challenges
NASA Astrophysics Data System (ADS)
Kouzes, Richard
2006-04-01
In August 1994, police at the Munich airport intercepted a suitcase from Moscow with half a kilogram of nuclear-reactor fuel, of which 363 grams was weapons- grade plutonium. A few months later police seized 2.7 kilograms of highly enriched uranium from a former worker at a Russian nuclear institute and his accomplices in Prague. These are just two of 18 incidents involving the smuggling of weapons grade nuclear materials between 1993 and 2004 reported by the International Atomic Energy Agency. The consequences of a stolen or improvised nuclear device being exploded in a U.S. city would be world changing. The concern over the possibility of a nuclear weapon, or the material for a weapon or a radiological dispersion device, being smuggled across U.S. borders has led to the deployment of radiation detection equipment at the borders. Related efforts are occurring around the world. Radiation portal monitors are used as the main screening tool, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. Passive detection techniques combined with imaging, and possibly active techniques, are the current available tools for screening cargo for items of concern. There are a number of physics limitations to what is possible with each technology given the presence of naturally occurring radioactive materials, commercial sources, and medical radionuclides in the stream of commerce. There have been a number of lessons learned to date from the various efforts in the U.S. and internationally about the capability for interdicting illicit nuclear material.
Possible standoff detection of ionizing radiation using high-power THz electromagnetic waves
NASA Astrophysics Data System (ADS)
Nusinovich, Gregory S.; Sprangle, Phillip; Romero-Talamas, Carlos A.; Rodgers, John; Pu, Ruifeng; Kashyn, Dmytro G.; Antonsen, Thomas M., Jr.; Granatstein, Victor L.
2012-06-01
Recently, a new method of remote detection of concealed radioactive materials was proposed. This method is based on focusing high-power short wavelength electromagnetic radiation in a small volume where the wave electric field exceeds the breakdown threshold. In the presence of free electrons caused by ionizing radiation, in this volume an avalanche discharge can then be initiated. When the wavelength is short enough, the probability of having even one free electron in this small volume in the absence of additional sources of ionization is low. Hence, a high breakdown rate will indicate that in the vicinity of this volume there are some materials causing ionization of air. To prove this concept a 0.67 THz gyrotron delivering 200-300 kW power in 10 microsecond pulses is under development. This method of standoff detection of concealed sources of ionizing radiation requires a wide range of studies, viz., evaluation of possible range, THz power and pulse duration, production of free electrons in air by gamma rays penetrating through container walls, statistical delay time in initiation of the breakdown in the case of low electron density, temporal evolution of plasma structure in the breakdown and scattering of THz radiation from small plasma objects. Most of these issues are discussed in the paper.
Liar! Liar! Deception Detection in 2035
2010-04-01
identify differences in tone, expression, behavior, and voluntary and involuntary biological responses to the questions. While existing technology does...was further shocked when he opened the door to discover two large police officers with weapons drawn standing in the doorway shouting instructions...series of picture of the community, people who were present in the bank, stores in the area, pictures of weapons including one that matches the
Video error concealment using block matching and frequency selective extrapolation algorithms
NASA Astrophysics Data System (ADS)
P. K., Rajani; Khaparde, Arti
2017-06-01
Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.
Reducing health risk assigned to organic emissions from a chemical weapons incinerator.
Laman, David M; Weiler, B Douglas; Skeen, Rodney S
2013-03-01
Organic emissions from a chemical weapons incinerator have been characterized with an improved set of analytical methods to reduce the human health risk assigned to operations of the facility. A gas chromatography/mass selective detection method with substantially reduced detection limits has been used in conjunction with scanning electron microscopy/energy dispersive X-ray spectrometry and Fourier transform infrared microscopy to improve the speciation of semi-volatile and non-volatile organics emitted from the incinerator. The reduced detection limits have allowed a significant reduction in the assumed polycyclic aromatic hydrocarbon (PAH) and aminobiphenyl (ABP) emission rates used as inputs to the human health risk assessment for the incinerator. A mean factor of 17 decrease in assigned human health risk is realized for six common local exposure scenarios as a result of the reduced PAH and ABP detection limits.
Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M
2015-01-01
Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.
Schrimshaw, Eric W; Siegel, Karolynn; Downing, Martin J; Parsons, Jeffrey T
2013-02-01
Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. An ethnically diverse sample of 203 non-gay-identified, behaviorally bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure.
Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.
2013-01-01
Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123
Criminal Intent with Property: A Study of Real Estate Fraud Prediction and Detection
ERIC Educational Resources Information Center
Blackman, David H.
2013-01-01
The large number of real estate transactions across the United States, combined with closing process complexity, creates extremely large data sets that conceal anomalies indicative of fraud. The quantitative amount of damage due to fraud is immeasurable to the lives of individuals who are victims, not to mention the financial impact to…
Need for Nondestructive Evaluation (NDE) in the Detection of Decay in Structures
W. Wayne Wilcox
1991-01-01
Examples of the need for nondestructive and remote sensing technologies for evaluating early stages of decay are presented. The need is critical to develop methods of analyzing internal decay, at the center of large wood members, and decay behind concealing coverings. Current technologies are reviewed and their inadequacies discussed. Acoustic emission and...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowdermilk, W. H.; Brothers, L. J.
This was a collaborative effort by Lawrence Livermore National Security (formerly the University of California)/Lawrence Livermore National Laboratory (LLNL), Valley Forge Composite Technologies, Inc., and the following Russian Institutes: P. N. Lebedev Physical Institute (LPI), Innovative Technologies Center.(AUO CIT), Central Design Bureau-Almas (CDB Almaz), Moscow Instrument Automation Research Institute, and Institute for High Energy Physics (IBEP) to develop equipment and procedures for detecting explosive materials concealed in airline checked baggage and cargo.
Geometry, structure, and concealed lithology of the San Rafael Basin, southeastern Arizona
Bultman, Mark W.
1999-01-01
The contiguous United States has been well explored for exposed conventional mineral deposits. Therefore, it is likely that many economically viable and strategically significant conventional undiscovered mineral deposits will be found in bedrock concealed beneath basin sediments. Mineral resource assessments must incorporate an understanding of the geometry, structure, and concealed lithology of basins in order to be accurate. This report presents an analysis of the basin geometry and structure of the San Rafael basin in southeastern Arizona. In addition, a new methodology for inferring concealed lithology is presented and applied in the San Rafael basin. Gravity data is used to model the geometry of the basin using recent models of sediment density vs. depth developed in the region. This modeling indicates that the basin has a maximum depth of approximately 1.05 km plus or minus 0.10 km. In the southern portion, the basin can be modeled as an asymmetric graben faulted on the western margin. The northern portion of the basin is structurally more complex and may have high angle faults on the western, northern, and eastern margin. Near-ground closely spaced Earth’s total intensity magnetic field data is used to locate concealed faults within the basin. This data is also used to infer lithology concealed by shallow basin sediments. Airborne Earth’s total intensity magnetic field data is used to help infer concealed lithology in deep portions of the basin. The product of integrating all data and interpretations is a map which presents the geometry of the basin, faults and contacts concealed by basin sediments, and an estimate of the bedrock lithology concealed by basin sediment. Based on basin geometry and concealed lithology, the San Rafael basin has a high potential for concealed mineral deposits on its western and northern margin. In particular, a newly discovered magnetic anomaly in the northern portion of the basin can be modeled as a granitic intrusion with highly altered margins and may represent a potential mineral resource target. Based on the permeability and porosity of upper basin fill found in nearby basins, the San Rafael basin may contain an aquifer up to 300 meters thick over a substantial area of the basin.
NASA Astrophysics Data System (ADS)
Reber, E. E.; Foote, F. B.; Schellenbaum, R. L.; Bradley, R. G.
1981-07-01
The potential of radiometric imaging technique to detect shielded nuclear materials and explosives carried covertly by personnel was investigated. This method of detecting contraband depends upon the differences in emissivity and reflectivity of the contraband relative to human tissue. Explosives, unlike metals and metal composites, generally have high emissivities and low reflectivities that closely approximate those of human tissue making explosives difficult to detect. Samples of several common types of explosives (TNT, Detasheet, C4, and several types of water gels) were examined at the 1.4- and 3-mm wavelengths using active and passive radiometeric techniques.
An explosives detection system for airline security using coherent x-ray scattering technology
NASA Astrophysics Data System (ADS)
Madden, Robert W.; Mahdavieh, Jacob; Smith, Richard C.; Subramanian, Ravi
2008-08-01
L-3 Communications Security and Detection Systems (SDS) has developed a new system for automated alarm resolution in airline baggage Explosive Detection Systems (EDS) based on coherent x-ray scattering spectroscopy. The capabilities of the system were demonstrated in tests with concealed explosives at the Transportation Security Laboratory and airline passenger baggage at Orlando International Airport. The system uses x-ray image information to identify suspicious objects and performs targeted diffraction measurements to classify them. This extra layer of detection capability affords a significant reduction in the rate of false alarm objects that must presently be resolved by opening passenger bags for hand inspection.
Why the United States Underestimated the Soviet BW Threat
2006-09-01
air sampling.2 For example, the nuclear power plant at Yongbyon in the Democratic People’s Republic of Korea was detected operating shortly after it...Cirincione, Wolfsthal, and Rajkumar, Deadly Arsenals, 435-437. 3 short amount of time. Chemical weapons plants also have large footprints that can...chemical processing plant for industry or agriculture is possible. For example, phosgene was a chemical weapon used extensively in World War I. This
Cloning and Expressing Recombinant Protective Antigen Domains of B. anthracis
2011-09-01
future predictive modeling toolkits. 1 1. Introduction The use of Bacillus anthracis as a bio - weapon in the United States in 2001 affirmed the need...for improved sensing and detection of biological weapons of mass destruction (WMD). Protective Antigen (PA) protein of Bacillus anthracis is the...Cloning and Expressing Recombinant Protective Antigen Domains of B. anthracis by Deborah A. Sarkes, Joshua M. Kogot, Irene Val-Addo
Harvey, Scott D [Kennewick, WA
2011-06-21
A process and sensor device are disclosed that employ metal .beta.-diketonate polymers to selectively capture gas-phase explosives and weaponized chemical agents in a sampling area or volume. The metal .beta.-diketonate polymers can be applied to surfaces in various analytical formats for detection of: improvised explosive devices, unexploded ordinance, munitions hidden in cargo holds, explosives, and chemical weapons in public areas.
Development and Validation of the Body Concealment Scale for Scleroderma.
Jewett, Lisa R; Malcarne, Vanessa L; Kwakkenbos, Linda; Harcourt, Diana; Rumsey, Nichola; Körner, Annett; Steele, Russell J; Hudson, Marie; Baron, Murray; Haythornthwaite, Jennifer A; Heinberg, Leslie; Wigley, Fredrick M; Thombs, Brett D
2016-08-01
Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Initial items for the Body Concealment Scale for Scleroderma (BCSS) were selected using item analysis in a development sample of 93 American SSc patients. The factor structure of the BCSS was evaluated in 742 Canadian patients with single-factor, 2-factor, and bifactor confirmatory factor analysis models. Convergent and divergent validity were assessed by comparing the BCSS total score with the Brief-Satisfaction with Appearance Scale (Brief-SWAP) and measures of depressive symptoms and pain. A 2-factor model (Comparative Fit Index [CFI] 0.99, Tucker-Lewis Index [TLI] 0.98, Root Mean Square Error of Approximation [RMSEA] 0.08) fit substantially better than a 1-factor model (CFI 0.95, TLI 0.94, RMSEA 0.15) for the 9-item BCSS, but the Concealment with Clothing and Concealment of Hands factors were highly correlated (α = 0.79). The bifactor model (CFI 0.99, TLI 0.99, RMSEA 0.08) also fit well. In the bifactor model, the omega coefficient was high for the general factor (ω = 0.80), but low for the Concealment with Clothing (ω = 0.01) and Concealment of Hands (ω = 0.33) factors. The BCSS total score correlated more strongly with the Brief-SWAP Social Discomfort (r = 0.59) and Dissatisfaction with Appearance (r = 0.53) subscales than with measures of depressive symptoms and pain. The BCSS sum score is a valid indicator of body concealment in SSc that extends the concepts of body concealment and avoidance beyond the realms of body shape and weight to concerns of individuals with visible differences from SSc. © 2016, American College of Rheumatology.
Physics in the Confrontation of Nuclear Weapons
NASA Astrophysics Data System (ADS)
Toevs, James
2011-03-01
Had the detonations on 9/11 involved nuclear explosives rather than jet fuel the number of deaths and the costs would have been multiplied by 100 or 1,000. This talk will briefly describe the nuclear threat and then focus on the technologies, both extant and evolving, for the detection and interdiction of clandestine trafficking of nuclear weapons and nuclear and radiological material. The methods vary from passive detection of heat, gamma radiation, neutrons, or other signatures from nuclear material, through radiological approaches to examine contents of vehicles and cargo containers, to active interrogation concepts that are under development. All of these methods have major physics components ranging from simple gamma ray detection as learned in a senior undergraduate lab to the latest ideas in muon production and acceleration.
Monitoring of atmospheric nuclear explosions with infrasonic microphone arrays
NASA Astrophysics Data System (ADS)
Wilson, Charles R.
2002-11-01
A review is given of the various United States programs for the infrasonic monitoring of atmospheric nuclear explosions from their inception in 1946 to their termination in 1975. The US Atomic Energy Detection System (USAEDS) monitored all nuclear weapons tests that were conducted by the Soviet Union, France, China, and the US with arrays of sensitive microbarographs in a worldwide network of infrasonic stations. A discussion of the source mechanism for the creation and subsequent propagation around the globe of long wavelength infrasound from explosions (volcanic and nuclear) is given to show the efficacy of infrasonic monitoring for the detection of atmospheric nuclear weapons tests. The equipment that was used for infrasound detection, the design of the sensor arrays, and the data processing techniques that were used by USAEDS are all discussed.
Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan
2014-05-01
We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.
Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole
2017-01-01
Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18–22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one’s identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support, and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one’s identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications. PMID:27633070
Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit
2017-03-01
People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.
Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole
2017-01-01
Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.
Plasma radome designed for the EMP effects defense
NASA Astrophysics Data System (ADS)
Li, Zhigang; Wang, Jiachun; Cheng, Li; Wang, Qichao
2016-11-01
Radar, as the main detection means, plays an extremely important role in modern warfare. However, it is easily attacked by the electromagnetic pulse (EMP) weapon. In order to defense the threat, a radome formed by plasma is designed. The plasma radome is used to protect the radar systems against EMP coupling through both `front door' and `back door'. What's more, the damage effects of EMP to the radar systems are analyzed, and the protection mechanism of plasma to EMP weapon is discussed. In addition, a simulation experiment is carried out to verify the feasibility of the plasma radome to defense against EMP. The results indicate that the structure performs well, which makes it a new method against EMP weapon.
The Act of Answering Questions Elicited Differentiated Responses in a Concealed Information Test.
Otsuka, Takuro; Mizutani, Mitsuyoshi; Yagi, Akihiro; Katayama, Jun'ichi
2018-04-17
The concealed information test (CIT), a psychophysiological detection of deception test, compares physiological responses between crime-related and crime-unrelated items. In previous studies, whether the act of answering questions affected physiological responses was unclear. This study examined effects of both question-related and answer-related processes on physiological responses. Twenty participants received a modified CIT, in which the interval between presentation of questions and answering them was 27 s. Differentiated respiratory movements and cardiovascular responses between items were observed for both questions (items) and answers, while differentiated skin conductance response was observed only for questions. These results suggest that physiological responses to questions reflected orientation to a crime-related item, while physiological responses during answering reflected inhibition of psychological arousal caused by orienting. Regarding the CIT's accuracy, participants' perception of the questions themselves more strongly influenced physiological responses than answering them. © 2018 American Academy of Forensic Sciences.
Detection of concealed cars in complex cargo X-ray imagery using Deep Learning.
Jaccard, Nicolas; Rogers, Thomas W; Morton, Edward J; Griffin, Lewis D
2017-01-01
Non-intrusive inspection systems based on X-ray radiography techniques are routinely used at transport hubs to ensure the conformity of cargo content with the supplied shipping manifest. As trade volumes increase and regulations become more stringent, manual inspection by trained operators is less and less viable due to low throughput. Machine vision techniques can assist operators in their task by automating parts of the inspection workflow. Since cars are routinely involved in trafficking, export fraud, and tax evasion schemes, they represent an attractive target for automated detection and flagging for subsequent inspection by operators. Development and evaluation of a novel method for the automated detection of cars in complex X-ray cargo imagery. X-ray cargo images from a stream-of-commerce dataset were classified using a window-based scheme. The limited number of car images was addressed by using an oversampling scheme. Different Convolutional Neural Network (CNN) architectures were compared with well-established bag of words approaches. In addition, robustness to concealment was evaluated by projection of objects into car images. CNN approaches outperformed all other methods evaluated, achieving 100% car image classification rate for a false positive rate of 1-in-454. Cars that were partially or completely obscured by other goods, a modus operandi frequently adopted by criminals, were correctly detected. We believe that this level of performance suggests that the method is suitable for deployment in the field. It is expected that the generic object detection workflow described can be extended to other object classes given the availability of suitable training data.
1981-03-01
systems, sub- systems, equipment, weapons, tactics, missions, etc. Concepts and Principles - Fundamental truths, ideas, opinions and thoughts formed from...verification, etc. Grasping the meaning of concepts and principles , i.e., understanding the basic principles of infrared and radar detection. Understanding...concepts, principles , procedures, etc.). Analysis A demonstration of a learned process of breaking down material (i.e., data, other information) into
United States Amphibious Forcible Entry: An Expensive Necessity
2011-03-17
controversial, Navy EOD teams also operate Marine Mammal Systems (MMS) such as dolphins , sea lions and beluga whales for mine detection and...such as laser weapons, touted as a ―game-changer,‖ are also being researched to counter the anti-ship missile threat.49 As Till noted, ―Throughout...Reported in Navy Laser Weapon Technology,‖ PilotOnline, (Norfolk Virginian-Pilot), 21 January 2011, http://hamptonroads.com (accessed 29 January 2011
USDA-ARS?s Scientific Manuscript database
Analytical methodology to detect ricin in food matrices is important because of the potential use of foodborne ricin as a terrorist weapon. Monoclonal antibodies (mAbs) that bind ricin were used for both capture and detection in sandwich enzyme-linked immunosorbent assay (ELISA) and electrochemilumi...
Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann
2013-06-01
Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.
Submillimeter video imaging with a superconducting bolometer array
NASA Astrophysics Data System (ADS)
Becker, Daniel Thomas
Millimeter wavelength radiation holds promise for detection of security threats at a distance, including suicide bombers and maritime threats in poor weather. The high sensitivity of superconducting Transition Edge Sensor (TES) bolometers makes them ideal for passive imaging of thermal signals at millimeter and submillimeter wavelengths. I have built a 350 GHz video-rate imaging system using an array of feedhorn-coupled TES bolometers. The system operates at standoff distances of 16 m to 28 m with a measured spatial resolution of 1.4 cm (at 17 m). It currently contains one 251-detector sub-array, and can be expanded to contain four sub-arrays for a total of 1004 detectors. The system has been used to take video images that reveal the presence of weapons concealed beneath a shirt in an indoor setting. This dissertation describes the design, implementation and characterization of this system. It presents an overview of the challenges associated with standoff passive imaging and how these problems can be overcome through the use of large-format TES bolometer arrays. I describe the design of the system and cover the results of detector and optical characterization. I explain the procedure used to generate video images using the system, and present a noise analysis of those images. This analysis indicates that the Noise Equivalent Temperature Difference (NETD) of the video images is currently limited by artifacts of the scanning process. More sophisticated image processing algorithms can eliminate these artifacts and reduce the NETD to 100 mK, which is the target value for the most demanding passive imaging scenarios. I finish with an overview of future directions for this system.
Scanning of vehicles for nuclear materials
NASA Astrophysics Data System (ADS)
Katz, J. I.
2014-05-01
Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost and disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.
Scanning of vehicles for nuclear materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Katz, J. I.
2014-05-09
Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost andmore » disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.« less
Thomas, Livia; Schwaninger, Adrian; Heimgartner, Nadja; Hedinger, Patrik; Hofer, Franziska; Ehlert, Ulrike; Wirtz, Petra H
2014-09-01
Aviation security strongly depends on screeners' performance in the detection of threat objects in x-ray images of passenger bags. We examined for the first time the effects of stress and stress-induced cortisol increases on detection performance of hidden weapons in an x-ray baggage screening task. We randomly assigned 48 participants either to a stress or a nonstress group. The stress group was exposed to a standardized psychosocial stress test (TSST). Before and after stress/nonstress, participants had to detect threat objects in a computer-based object recognition test (X-ray ORT). We repeatedly measured salivary cortisol and X-ray ORT performance before and after stress/nonstress. Cortisol increases in reaction to psychosocial stress induction but not to nonstress independently impaired x-ray detection performance. Our results suggest that stress-induced cortisol increases at peak reactivity impair x-ray screening performance. Copyright © 2014 Society for Psychophysiological Research.
Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per
2017-01-01
One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.
New Organic Scintillators for Neutron Detection
2016-03-01
highly enriched uranium and weapons grade plutonium. Neutrons and gamma rays are two signatures of these materials. Gamma ray detection techniques are...New Organic Scintillators for Neutron Detection Distribution Statement A. Approved for public release; distribution is unlimited. March...Title: New Organic Scintillators for Neutron Detection I. Abstract In this project, Radiation Monitoring Devices (RMD) proposes to develop novel
Digital image modification detection using color information and its histograms.
Zhou, Haoyu; Shen, Yue; Zhu, Xinghui; Liu, Bo; Fu, Zigang; Fan, Na
2016-09-01
The rapid development of many open source and commercial image editing software makes the authenticity of the digital images questionable. Copy-move forgery is one of the most widely used tampering techniques to create desirable objects or conceal undesirable objects in a scene. Existing techniques reported in the literature to detect such tampering aim to improve the robustness of these methods against the use of JPEG compression, blurring, noise, or other types of post processing operations. These post processing operations are frequently used with the intention to conceal tampering and reduce tampering clues. A robust method based on the color moments and other five image descriptors is proposed in this paper. The method divides the image into fixed size overlapping blocks. Clustering operation divides entire search space into smaller pieces with similar color distribution. Blocks from the tampered regions will reside within the same cluster since both copied and moved regions have similar color distributions. Five image descriptors are used to extract block features, which makes the method more robust to post processing operations. An ensemble of deep compositional pattern-producing neural networks are trained with these extracted features. Similarity among feature vectors in clusters indicates possible forged regions. Experimental results show that the proposed method can detect copy-move forgery even if an image was distorted by gamma correction, addictive white Gaussian noise, JPEG compression, or blurring. Copyright © 2016. Published by Elsevier Ireland Ltd.
Farwell, Lawrence A; Richardson, Drew C; Richardson, Graham M
2013-08-01
Brain fingerprinting detects concealed information stored in the brain by measuring brainwave responses. We compared P300 and P300-MERMER event-related brain potentials for error rate/accuracy and statistical confidence in four field/real-life studies. 76 tests detected presence or absence of information regarding (1) real-life events including felony crimes; (2) real crimes with substantial consequences (either a judicial outcome, i.e., evidence admitted in court, or a $100,000 reward for beating the test); (3) knowledge unique to FBI agents; and (4) knowledge unique to explosives (EOD/IED) experts. With both P300 and P300-MERMER, error rate was 0 %: determinations were 100 % accurate, no false negatives or false positives; also no indeterminates. Countermeasures had no effect. Median statistical confidence for determinations was 99.9 % with P300-MERMER and 99.6 % with P300. Brain fingerprinting methods and scientific standards for laboratory and field applications are discussed. Major differences in methods that produce different results are identified. Markedly different methods in other studies have produced over 10 times higher error rates and markedly lower statistical confidences than those of these, our previous studies, and independent replications. Data support the hypothesis that accuracy, reliability, and validity depend on following the brain fingerprinting scientific standards outlined herein.
Make the World Safer from Nuclear Weapons
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bowyer, Ted
Senior Nuclear Scientist Ted Bowyer knows firsthand the challenges associated with protecting our nation. Ted and his colleagues help detect the proliferation of nuclear weapons. They developed award-winning technologies that give international treaty verification authorities “eyes and ears” around the globe. The instruments, located in 80 countries, help ensure compliance with the Comprehensive Nuclear Test-Ban Treaty, or CTBT. They are completely automated radionuclide monitoring systems that would detect airborne radioactive particles if a nuclear detonation occurred in the air, underground or at sea. Some samples collected through these technologies are sent to PNNL’s Shallow Underground Laboratory—the only certified U.S. radionuclidemore » laboratory for the CTBT’s International Monitoring System Organization.« less
Waveform design for detection of weapons based on signature exploitation
NASA Astrophysics Data System (ADS)
Ahmad, Fauzia; Amin, Moeness G.; Dogaru, Traian
2010-04-01
We present waveform design based on signature exploitation techniques for improved detection of weapons in urban sensing applications. A single-antenna monostatic radar system is considered. Under the assumption of exact knowledge of the target orientation and, hence, known impulse response, matched illumination approach is used for optimal target detection. For the case of unknown target orientation, we analyze the target signatures as random processes and perform signal-to-noise-ratio based waveform optimization. Numerical electromagnetic modeling is used to provide the impulse responses of an AK-47 assault rifle for various target aspect angles relative to the radar. Simulation results depict an improvement in the signal-to-noise-ratio at the output of the matched filter receiver for both matched illumination and stochastic waveforms as compared to a chirp waveform of the same duration and energy.
Component pattern analysis of chemicals using multispectral THz imaging system
NASA Astrophysics Data System (ADS)
Kawase, Kodo; Ogawa, Yuichi; Watanabe, Yuki
2004-04-01
We have developed a novel basic technology for terahertz (THz) imaging, which allows detection and identification of chemicals by introducing the component spatial pattern analysis. The spatial distributions of the chemicals were obtained from terahertz multispectral transillumination images, using absorption spectra previously measured with a widely tunable THz-wave parametric oscillator. Further we have applied this technique to the detection and identification of illicit drugs concealed in envelopes. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
Defense Science Board 2005 Summer Study on Reducing Vulnerabilities to Weapons of Mass Destruction
2007-05-01
the potential of massive destruction from nuclear weapons in the former Soviet Union for nearly half a century during the Cold War. The principle...on limited aspects of a single modality—whether biological, chemical, nuclear , or radiological. Concerns such as detection, defeat, or consequence...as difficult and dangerous as possible and to minimize the likelihood that he will achieve his goals. The worst forms of WMD— nuclear and, in some
Good Bugs, Bad Bugs: A Modern Approach for Detecting Offensive Biological Weapons Research
2008-09-01
Michael Moodie is a consultant to CTNSP who has worked for more than 15 years on chemical and biological weapons issues in government and the ... the superstructure of the Convention and yet turn a blind eye to problems with the foundation itself. He then went on to state publicly that the ...Tunisia; a trilateral forum with Brazil, India, and South Africa fosters dialogue on critical biotechnology issues;6 the Economic Cooperation
Asynchronous Data-Driven Classification of Weapon Systems
2009-10-01
Classification of Weapon SystemsF Xin Jin† Kushal Mukherjee† Shalabh Gupta† Asok Ray † Shashi Phoha† Thyagaraju Damarla‡ xuj103@psu.edu kum162@psu.edu szg107...Orlando, FL. [8] A. Ray , “Symbolic dynamic analysis of complex systems for anomaly detection,” Signal Processing, vol. 84, no. 7, pp. 1115–1130, July...2004. [9] S. Gupta and A. Ray , “Symbolic dynamic filtering for data-driven pat- tern recognition,” PATTERN RECOGNITION: Theory and Application
Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing
2014-04-01
To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.
Computer vision, camouflage breaking and countershading
Tankus, Ariel; Yeshurun, Yehezkel
2008-01-01
Camouflage is frequently used in the animal kingdom in order to conceal oneself from visual detection or surveillance. Many camouflage techniques are based on masking the familiar contours and texture of the subject by superposition of multiple edges on top of it. This work presents an operator, Darg, for the detection of three-dimensional smooth convex (or, equivalently, concave) objects. It can be used to detect curved objects on a relatively flat background, regardless of image edges, contours and texture. We show that a typical camouflage found in some animal species seems to be a ‘countermeasure’ taken against detection that might be based on our method. Detection by Darg is shown to be very robust, from both theoretical considerations and practical examples of real-life images. PMID:18990669
Concealable Stigmatized Identities and Psychological Well-Being
Quinn, Diane M.; Earnshaw, Valerie A.
2013-01-01
Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive information – and magnitude – centrality and salience. Research has shown that negatively valenced content is related to increased psychological distress. However, smaller identity magnitude may buffer this distress. We review the research available and discuss important areas for future work. PMID:23730326
Detection of dim targets in multiple environments
NASA Astrophysics Data System (ADS)
Mirsky, Grace M.; Woods, Matthew; Grasso, Robert J.
2013-10-01
The proliferation of a wide variety of weapons including Anti-Aircraft Artillery (AAA), rockets, and small arms presents a substantial threat to both military and civilian aircraft. To address this ever-present threat, Northrop Grumman has assessed unguided threat phenomenology to understand the underlying physical principles for detection. These principles, based upon threat transit through the atmosphere, exploit a simple phenomenon universal to all objects moving through an atmosphere comprised of gaseous media to detect and track the threat in the presence of background and clutter. Threat detection has rapidly become a crucial component of aircraft survivability systems that provide situational awareness to the crew. It is particularly important to platforms which may spend a majority of their time at low altitudes and within the effective range of a large variety of weapons. Detection of these threats presents a unique challenge as this class of threat typically has a dim signature coupled with a short duration. Correct identification of each of the threat components (muzzle flash and projectile) is important to determine trajectory and intent while minimizing false alarms and maintaining a high detection probability in all environments.
Noninvasive deep Raman detection with 2D correlation analysis
NASA Astrophysics Data System (ADS)
Kim, Hyung Min; Park, Hyo Sun; Cho, Youngho; Jin, Seung Min; Lee, Kang Taek; Jung, Young Mee; Suh, Yung Doug
2014-07-01
The detection of poisonous chemicals enclosed in daily necessaries is prerequisite essential for homeland security with the increasing threat of terrorism. For the detection of toxic chemicals, we combined a sensitive deep Raman spectroscopic method with 2D correlation analysis. We obtained the Raman spectra from concealed chemicals employing spatially offset Raman spectroscopy in which incident line-shaped light experiences multiple scatterings before being delivered to inner component and yielding deep Raman signal. Furthermore, we restored the pure Raman spectrum of each component using 2D correlation spectroscopic analysis with chemical inspection. Using this method, we could elucidate subsurface component under thick powder and packed contents in a bottle.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Paul, J. N.; Chin, M. R.; Sjoden, G. E.
2013-07-01
A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reactionmore » rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)« less
Spiegel, Tali; De Bel, Vera; Steverink, Nardi
2016-01-01
This study aims to describe the interplay between the work trajectories and the passing patterns of individuals with degenerative eye conditions in different phases of their career, as well as the disease progression and the career and well-being outcomes associated with different works and passing trajectories. Qualitative interviews on the topic of work trajectories were conducted with 36 working or retired individuals with degenerative eye conditions. The "bigger picture" method was used to explore passing and concealment behavioral patterns, and their associations with various work trajectories. Five patterns of passing and concealment behavior in the workplace were identified and were linked with various work trajectories among visually impaired study participants: (1) no career adjustments, concealed condition throughout career; (2) revealed condition after adjusting career plans; (3) increasingly open about their condition over the course of their career; (4) engaged in career planning, always open about their condition; and (5) engaged in limited career planning, always open about their condition. Patterns characterized by less planning and more identity concealment were associated with more stress and lower levels of self-acceptance, while patterns characterized by more planning for vision deterioration and less passing behavior were associated with higher levels self-acceptance and fewer obstacles over the course of an individual's career. The study's findings can serve as a guide for health professionals. Many individuals with degenerative eye conditions try to conceal their identity as visually impaired in the professional setting. Different aspects of career outcomes (e.g. age of retirement) and wellbeing outcomes (e.g. self-acceptance and stress) associate with identity concealment patterns of individuals throughout their careers. Identifying concealment patterns will allow health professionals to tackle particular adverse outcomes and challenges associated with these patterns.
NASA Astrophysics Data System (ADS)
Qu, Zhou; Xing, Hao; Wang, Dawei; Wang, Qiugui
2015-10-01
High-energy Laser weapon is a new-style which is developing rapidly nowadays. It is a one kind of direction energy weapon which can destroy the targets or make them invalid. High-energy Laser weapon has many merits such as concentrated energy, fast transmission, long operating range, satisfied precision, fast shift fire, anti-electromagnetic interference, reusability, cost-effectiveness. High-energy Laser weapon has huge potential for modern warfare since its laser beam launch attack to the target by the speed of light. High-energy Laser weapon can be deployed by multiple methods such as skyborne, carrier borne, vehicle-mounted, foundation, space platform. Besides the connection with command and control system, High-energy Laser weapon is consist of high-energy laser and beam steering. Beam steering is comprised of Large diameter launch system and Precision targeting systems. Meanwhile, beam steering includes the distance measurement of target location, detection system of television and infrared sensor, adaptive optical system of Laser atmospheric distortion correction. The development of laser technology is very fast in recent years. A variety of laser sources have been regarded as the key component in many optoelectronic devices. For directed energy weapon, the progress of laser technology has greatly improved the tactical effectiveness, such as increasing the range and strike precision. At the same time, the modern solid-state laser has become the ideal optical source for optical countermeasure, because it has high photoelectric conversion efficiency and small volume or weight. However, the total performance is limited by the mutual cooperation between different subsystems. The optical countermeasure is a complex technique after many years development. The key factor to evaluate the laser weapon can be formulated as laser energy density to target. This article elaborated the laser device technology of optoelectronic countermeasure and Photoelectric tracking technology. Also the allocation of optoelectronic countermeasure was discussed in this article. At last, this article prospected the future development of high-energy laser.
Malterud, Kirsti; Bjorkman, Mari
2016-10-01
The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."
2016-08-01
a series on SPY-1 radar spare parts. The SPY-1 radar is an advanced , automatic detect and track radar system . The SPY-1 radar is one of 13 major...the AEGIS Weapon System could be adversely impacted if parts needed to maintain the SPY-1 radars are not transported to the warfighters when...for SPY-1 Radar Sustainment (Report No. DODIG-2016-116) We are providing this report for review and comment. Naval Supply Systems Command Weapon
The detection of gunshot residues in the nasal mucus of suspected shooters.
Merli, Daniele; Brandone, Alberto; Amadasi, Alberto; Cattaneo, Cristina; Profumo, Antonella
2016-07-01
The identification and quantification of metallic residues produced by gunshots, called gunshot residues (GSR), provide crucial elements in forensic investigations. The research has been largely focused on their collection onto the hands of suspected shooters, but the method is often burdened by risks of contamination. This research was focused on the possibility of sampling GSR trapped inside the nasal mucus of consenting shooters. Samples of the nasal mucus of "blank" control subjects and shooters were chemically analysed by Instrumental Neutron Activation Analysis (INAA), for residues of antimony (Sb) and barium (Ba), while lead (Pb) was excluded as ubiquitously environmental contaminant and due to high instrumental quantification limit (IQL) of INAA for this element. Shots were fired using two types of weapons (pistols and revolvers) and different firing sequences. The mucus was sampled at different times: immediately after the shots, after 30-60-120 and 180 min. Different amounts of Sb and Ba were detected between controls and shooters, witnessing the ability of the nasal mucus to retain GSR at concentrations significantly different even from the highest basal levels. Moreover, in order to simulate actual cases, nasal mucus from five groups of shooters was sampled after different shots with the same weapon and cartridges, immediately and after 1, 3, 12, and 24 h. The highest values were always found in the first 3 h from firing, for both weapons. Interestingly, for all the weapons, significant Sb and Ba concentrations were also found up to 12 h after firing, contrary to what occurs on hands, even though a progressive decrease was detected, with values below the detection threshold only after 24 h, thus demonstrating that GSR are persistent in nasal mucus. These first results proving that both Sb and Ba were qualitatively detectable in the nasal mucus of shooters indicate that the chemical analysis of the nasal mucus of suspected shooters may represent a promising tool in the forensic field since it is less burdened by problems related to sampling or contamination than the usual sampling on hand, providing that ammunitions employed contain Ba and Sb.
Technical approaches to reducing the threat of nuclear terrorism
NASA Astrophysics Data System (ADS)
Priedhorsky, William C.
2005-04-01
The threat of a nuclear attack on the United States by terrorists using a smuggled weapon is now considered more likely than an attack by a nuclear-armed ballistic missle. Consequently it is important to understand what can be done to detect and intercept a nuclear weapon being smuggled into the United States. A significant quantity of smuggled nuclear material has been intercepted already, but science and technology have so far contributed little to its interception. The critical special nuclear materials, plutonium and highly enriched uranium, are only weakly radioactive and detection of their radioactivity is limited both by atmospheric attenuation and by competition with natural backgrounds. Although many schemes for long-range detection of radioactivity have been proposed, none so far appears feasible. Detection of nuclear radiation can be improved using new technologies and sensing systems, but it will still be possible only at relatively small distances. Consequently the best approach to containing dangerous nuclear materials is at their sources; containment within lengthy borders and large areas is extremely difficult.
Neutron Resonance Radiography for Explosives Detection: Technical Challenges
DOE Office of Scientific and Technical Information (OSTI.GOV)
Raas, W L; Blackburn, B; Boyd, E
2005-11-09
Fast Neutron Resonance Radiography (NRR) has recently become a focus of investigation as a supplement to conventional x-ray systems as a non-invasive, non-destructive means of detecting explosive material concealed in checked luggage or cargo containers at airports. Using fast (1-6 MeV) neutrons produced by the D(d,n){sup 3}He reaction, NRR provides both an imaging capability and the ability to determine the chemical composition of materials in baggage or cargo. Elemental discrimination is achieved by exploiting the resonance features of the neutron cross-section for oxygen, nitrogen, carbon, and hydrogen. Simulations have shown the effectiveness of multiple-element NRR through Monte Carlo transport methods;more » this work is focused on the development of a prototype system that will incorporate an accelerator-based neutron source and a neutron detection and imaging system to demonstrate the realistic capabilities of NRR in distinguishing the elemental components of concealed objects. Preliminary experiments have exposed significant technical difficulties unapparent in simulations, including the presence of image contamination from gamma ray production, the detection of low-fluence fast neutrons in a gamma field, and the mechanical difficulties inherent in the use of thin foil windows for gas cell confinement. To mitigate these concerns, a new gas target has been developed to simultaneously reduce gamma ray production and increase structural integrity in high flux gas targets. Development of a neutron imaging system and neutron counting based on characteristic neutron pulse shapes have been investigated as a means of improving signal to noise ratios, reducing irradiation times, and increasing the accuracy of elemental determination.« less
Concealed identification symbols and nondestructive determination of the identification symbols
Nance, Thomas A.; Gibbs, Kenneth M.
2014-09-16
The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.
Evidence of VX nerve agent use from contaminated white mustard plants
Gravett, Matthew R.; Hopkins, Farrha B.; Self, Adam J.; Webb, Andrew J.; Timperley, Christopher M.; Baker, Matthew J.
2014-01-01
The Chemical Weapons Convention prohibits the development, production, acquisition, stockpiling, retention, transfer or use of chemical weapons by Member States. Verification of compliance and investigations into allegations of use require accurate detection of chemical warfare agents (CWAs) and their degradation products. Detection of CWAs such as organophosphorus nerve agents in the environment relies mainly upon the analysis of soil. We now present a method for the detection of the nerve agent VX and its hydrolysis products by gas chromatography and liquid chromatography mass spectrometry of ethanol extracts of contaminated white mustard plants (Sinapis alba) which retained the compounds of interest for up to 45 days. VX is hydrolysed by the plants to ethyl methylphosphonic acid and then to methylphosphonic acid. The utility of white mustard as a nerve agent detector and remediator of nerve agent-polluted sites is discussed. The work described will help deter the employment of VX in conflict. PMID:25104906
NASA Astrophysics Data System (ADS)
Polom, Ulrich; Mueller, Christof; Krawczyk, CharLotte M.
2016-04-01
The Mw 7.1 Darfield Earthquake in September 2010 ruptured the surface along the Greendale Fault that was not known prior to the earthquake. The subsequent Mw 6.3 Christchurch earthquake in February 2011 demonstrated that concealed active faults have a significant risk potential for urban infrastructure and human life in New Zealand if they are located beneath or close to such areas. Mapping exposures and analysis of active faults incorporated into the National Seismic Hazard Model (NSHM) suggests that several thousands of these active structures are yet to be identified and have the potential to generate moderate to large magnitude earthquakes (i.e. magnitudes >5). Geological mapping suggests that active faults pass beneath, or within many urban areas in New Zealand, including Auckland, Blenheim, Christchurch, Hastings/Napier, Nelson, Rotorua, Taupo, Wellington, and Whakatane. Since no established methodology for routinely locating and assessing the earthquake hazard posed by concealed active faults is available, the principal objective of the presented study was to evaluate the usefulness of high-resolution shear wave seismic reflection profiling using a land streamer to locate buried faults in urban areas of New Zealand. During the survey carried out in the city of Whakatane in February 2015, the method was first tested over a well known surface outcrop of the Edgecumbe Fault 30 km south-west of Whakatane city. This allowed further to investigate the principle shear wave propagation characteristics in the unknown sediments, consisting mainly of effusive rock material of the Taupo volcanic zone mixed with marine transgression units. Subsequently the survey was continued within Whakatane city using night operation time slots to reduce the urban noise. In total, 11 profiles of 5.7 km length in high data quality were acquired, which clearly show concealed rupture structures of obviously different age in the shallow sediments down to 100 m depth. Subject to depth verification by drillings normal fault displacements of up to 15 m are visible in depths of 20-40 m, deeper rupture structures show displacements of up to 20 m. Furthermore, indications of strike-slip fault activities are visible. The concealed rupture structures found are not aligned along former estimated fault lineaments or main surface structures like the Whakatane river bed. Correlations exist with small topographic variations detected by LIDAR imaging and surface signatures on a historic map of 1867.
Hostile fire indicator threat data collection for helicopter-mounted applications
NASA Astrophysics Data System (ADS)
Naz, P.; Hengy, S.; De Mezzo, S.
2013-05-01
This paper briefly describes the set-up of the sensors and the instrumentation deployed by the French-German Research Institute of Saint-Louis (ISL) during the last NATO/ACG3/SG2 HFI Threat Data Collection (Trial PROTEUS which has been conducted during the summer 2012 in Slovenia). The main purpose of this trial was the measurements of weapon and ammunition signatures for threat warning and hostile fire indicator (HFI) system development. The used weapons vary from small caliber rifles to anti-tank rockets in ground-to-ground shooting configurations. For the ISL team, the objectives consisted in measuring the acoustic signals for detection and localization of weapon firing events. Experimental results of sound localization obtained by using ground based sensors are presented and analyzed under various conditions.
Detection of weapons of mass destruction
NASA Astrophysics Data System (ADS)
Bjorkholm, Paul J.
2003-07-01
High Energy X-ray cargo screening is a mature technology that has proven its value in the detection of contraband material hidden within cargo including fully loaded sea containers. To date high energy screening has been largely applied to manifest verification and to drug detection. However, the dramatic change in world terrorism has altered the application. Now it is essential that weapons of mass destruction (WMD"s) be interdicted with incredibly high accuracy. The implication of a missed detection has gone from loss of revenue or the lowering of the street price of drugs to potentially stopping, at least for some significant time, most world commerce. Screening containers with high energy x-rays (~250+ mm of steel penetration) is capable of detecting all nuclear threats at a fraction of the strategically important mass. The screening operation can be automated so that no human decisions are required with very low false alarms. Finally, the goal of 100% inspection of cargo inbound to the United States from the twenty largest international ports is an achievable goal with hardware costs in the area of that already spent on airport security.
49 CFR 1544.103 - Form, content, and availability.
Code of Federal Regulations, 2013 CFR
2013-10-01
... regarding the use of explosives detection systems. (8) The procedures used to comply with the requirements... the introduction of explosives, incendiaries, or weapons aboard an aircraft. (2) Be in writing and... use of metal detection devices. (6) The procedures and description of the facilities and equipment...
49 CFR 1544.103 - Form, content, and availability.
Code of Federal Regulations, 2014 CFR
2014-10-01
... regarding the use of explosives detection systems. (8) The procedures used to comply with the requirements... the introduction of explosives, incendiaries, or weapons aboard an aircraft. (2) Be in writing and... use of metal detection devices. (6) The procedures and description of the facilities and equipment...
49 CFR 1544.103 - Form, content, and availability.
Code of Federal Regulations, 2012 CFR
2012-10-01
... regarding the use of explosives detection systems. (8) The procedures used to comply with the requirements... the introduction of explosives, incendiaries, or weapons aboard an aircraft. (2) Be in writing and... use of metal detection devices. (6) The procedures and description of the facilities and equipment...
The association between concealing emotions at work and medical utilization in Korea.
Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon
2014-01-01
We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.
Rosenfeld, J Peter; Labkovsky, Elena; Davydova, Elena; Ward, Anne; Rosenfeld, Lauren
2017-05-01
Previous research indicated that the skin conductance response of the autonomic nervous system in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor P300 tests based on the three-stimulus protocol for detection of cognitive malingering (although these are not the same as CITs). The present report is the first attempt to study the effect of financial motivation on the P300-based Complex Trial Protocol using both episodic and semantic memory probe and irrelevant stimuli. The Test of Memory Malingering (TOMM) was used to validate behavioral differences between the two groups we created by offering one (paid) group but not another (unpaid) group a financial reward for beating our tests. Group behavioral differences on the TOMM did confirm group manipulations. Probe-minus-irrelevant P300 differences did not differ between groups, although as previously, semantic memory-evoked P300s were larger than episodic memory-evoked P300s. © 2017 Society for Psychophysiological Research.
Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.
2014-01-01
A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational affiliation. PMID:25565941
Concealment of type 1 diabetes at work in Finland: a mixed-method study
Munir, Fehmidah; Moilanen, Leena; Räsänen, Kimmo; Hänninen, Vilma
2018-01-01
Objectives To explore the possible reasons for concealing type 1 diabetes (T1D) at work. Methods The main set of data came from a cross-sectional survey (response rate 49.3%), the participants of which were 688 wage earners with T1D. Concealment of T1D was measured by asking respondents have they ever during their working career hidden their diabetes from their (A) colleagues and (B) line manager. Furthermore, semistructured interviews (n=20) were conducted to obtain deeper understanding. Questionnaire data were analysed using logistic regression analyses and qualitative interviews with inductive thematic analysis. Results About 30% of wage earners with T1D had concealed their condition during their working career from their colleagues and almost 20% from their line manager. Individuals aged 18–44 years age were more likely to conceal their T1D from their colleagues than older workers during their working career. Not disclosing T1D to the extended family (OR 5.24 (95% CI 2.06 to 13.35)), feeling an outsider at work (OR 2.47 (95% CI 1.58 to 3.84)), being embarrassed by receiving special attention at work (OR 1.99 (95% CI 1.33 to 2.96)) and neglecting treatment at work (OR 1.59 (95% CI 1.01 to 2.48)) were all associated with concealment of T1D from colleagues. The youngest age group of 18–24 years were more likely to conceal their T1D from their line managers than the older age groups during their working career. Not disclosing T1D to the extended family (OR 4.41 (95% CI 1.72 to 11.32)), feeling like an outsider at work (OR 2.51 (1.52 to 4.14)) and being embarrassed by receiving special attention at work (OR 1.81 (95% CI 1.13 to 2.91)) were associated with concealment of T1D from line managers. From the interviews, five main themes related to concealment emerged, expressing fears related to the consequences of telling: (1) being perceived as weak, (2) job discrimination, (3) unwanted attention, (4) being seen as a person who uses their T1D for seeking advantages and (5) losing privacy. Conclusions A considerable proportion of wage earners with T1D are concealing their diagnosis often because of feelings associated with stigma. Both overemphasis and underestimation of T1D at work by the colleagues or line manager may lead to concealing T1D and may thus be harmful to self-management of T1D. The obstacles in disclosing T1D might be diminished by giving adequate information at the workplace about the condition and its significance. PMID:29331976
Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements
Iwasaki, Miho; Noguchi, Yasuki
2016-01-01
When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796
Eppinger, Robert G.; Kelley, Karen D.; Fey, David L.; Giles, Stuart A.; Minsley, Burke J.; Smith, Steven M.
2010-01-01
From 2007 through 2010, scientists in the U.S. Geological Survey (USGS) have been conducting exploration-oriented geochemical and geophysical studies in the region surrounding the giant Pebble porphyry Cu-Au-Mo deposit in southwestern Alaska. The Cretaceous Pebble deposit is concealed under tundra, glacial till, and Tertiary cover rocks, and is undisturbed except for numerous exploration drill holes. These USGS studies are part of a nation-wide research project on evaluating and detecting concealed mineral resources. This report focuses on exploration geochemistry and comprises illustrations and associated notes that were presented as a case study in a workshop on this topic. The workshop, organized by L.G. Closs and R. Glanzman, is called 'Geochemistry in Mineral Exploration and Development,' presented by the Society of Economic Geologists at a technical conference entitled 'The Challenge of Finding New Mineral Resources: Global Metallogeny, Integrative Exploration and New Discoveries,' held at Keystone, Colorado, October 2-5, 2010.
Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements.
Iwasaki, Miho; Noguchi, Yasuki
2016-02-26
When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions.
Fast, High-Resolution Terahertz Radar Imaging at 25 Meters
NASA Technical Reports Server (NTRS)
Cooper, Ken B.; Dengler, Robert J.; Llombart, Nuria; Talukder, Ashit; Panangadan, Anand V.; Peay, Chris S.; Siegel, Peter H.
2010-01-01
We report improvements in the scanning speed and standoff range of an ultra-wide bandwidth terahertz (THz) imaging radar for person-borne concealed object detection. Fast beam scanning of the single-transceiver radar is accomplished by rapidly deflecting a flat, light-weight subreflector in a confocal Gregorian optical geometry. With RF back-end improvements also implemented, the radar imaging rate has increased by a factor of about 30 compared to that achieved previously in a 4 m standoff prototype instrument. In addition, a new 100 cm diameter ellipsoidal aluminum reflector yields beam spot diameters of approximately 1 cm over a 50x50 cm field of view at a range of 25 m, although some aberrations are observed that probably arise from misaligned optics. Through-clothes images of a concealed threat at 25 m range, acquired in 5 seconds, are presented, and the impact of reduced signal-to-noise from an even faster frame rate is analyzed. These results inform the system requirements for eventually achieving sub-second or video-rate THz radar imaging.
Submillimetre wave imaging and security: imaging performance and prediction
NASA Astrophysics Data System (ADS)
Appleby, R.; Ferguson, S.
2016-10-01
Within the European Commission Seventh Framework Programme (FP7), CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) has designed and is fabricating a stand-off system operating at sub-millimetre wave frequencies for the detection of objects concealed on people. This system scans people as they walk by the sensor. This paper presents the top level system design which brings together both passive and active sensors to provide good performance. The passive system operates in two bands between 100 and 600GHz and is based on a cryogen free cooled focal plane array sensor whilst the active system is a solid-state 340GHz radar. A modified version of OpenFX was used for modelling the passive system. This model was recently modified to include realistic location-specific skin temperature and to accept animated characters wearing up to three layers of clothing that move dynamically, such as those typically found in cinematography. Targets under clothing have been modelled and the performance simulated. The strengths and weaknesses of this modelling approach are discussed.
A Concealed Barcode Identification System Using Terahertz Time-domain Spectroscopy
NASA Astrophysics Data System (ADS)
Guan, Yu; Yamamoto, Manabu; Kitazawa, Toshiyuki; Tripathi, Saroj R.; Takeya, Kei; Kawase, Kodo
2015-03-01
We present a concealed terahertz barcode/chipless tag to achieve remote identification through an obstructing material using terahertz radiation. We show scanned terahertz reflection spectral images of barcodes concealed by a thick obstacle. A concealed and double- side printed terahertz barcode structure is proposed, and we demonstrate that our design has better performance in definition than a single-side printed barcode using terahertz time-domain spectroscopy. This technique combines the benefits of a chipless tag to read encoded information covered by an optically opaque material with low cost and a simple fabrication process. Simulations are also described, along with an explanation of the principle of the terahertz barcode identification system.
Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K
2016-12-01
This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.
Associations Between Secret-Keeping and Quality of Life in Older Adults.
Maas, Joyce; Wismeijer, Andreas A J; Van Assen, Marcel A L M
2018-01-01
This study examined the effects of secrecy on quality of life in a sample consisting of older adults (>50 years; N = 301). Three key components of secrecy were examined with the Tilburg Secrecy Scale-25 (TSS25; possession of a secret, self-concealment, and cognitive preoccupation). The TSS25 distinguishes between the tendency to conceal personal information (self-concealment) and the tendency to worry or ruminate about the secret (cognitive preoccupation), thereby enabling investigation of the effects of secrecy on quality of life in detail. Confirming previous findings in younger samples, we found a positive effect of possession of a secret on quality of life, after controlling for both TSS25's self-concealment and cognitive preoccupation. This suggests that keeping secrets may have a positive association with quality of life in older adults as well, as long as they do not have the tendency to self-conceal and are not cognitively preoccupied with their secret.
Memory Detection 2.0: The First Web-Based Memory Detection Test
Kleinberg, Bennett; Verschuere, Bruno
2015-01-01
There is accumulating evidence that reaction times (RTs) can be used to detect recognition of critical (e.g., crime) information. A limitation of this research base is its reliance upon small samples (average n = 24), and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262) tried to hide 2 high salient (birthday, country of origin) and 2 low salient (favourite colour, favourite animal) autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research. PMID:25874966
Joint chemical agent detector (JCAD): the future of chemical agent detection
NASA Astrophysics Data System (ADS)
Laljer, Charles E.
2003-08-01
The Joint Chemical Agent Detector (JCAD) has continued development through 2002. The JCAD has completed Contractor Validation Testing (CVT) that included chemical warfare agent testing, environmental testing, electromagnetic interferent testing, and platform integration validation. The JCAD provides state of the art chemical warfare agent detection capability to military and homeland security operators. Intelligence sources estimate that over twenty countries have active chemical weapons programs. The spread of weapons of mass destruction (and the industrial capability for manufacture of these weapons) to third world nations and terrorist organizations has greatly increased the chemical agent threat to U.S. interests. Coupled with the potential for U.S. involvement in localized conflicts in an operational or support capacity, increases the probability that the military Joint Services may encounter chemical agents anywhere in the world. The JCAD is a small (45 in3), lightweight (2 lb.) chemical agent detector for vehicle interiors, aircraft, individual personnel, shipboard, and fixed site locations. The system provides a common detection component across multi-service platforms. This common detector system will allow the Joint Services to use the same operational and support concept for more efficient utilization of resources. The JCAD detects, identifies, quantifies, and warns of the presence of chemical agents prior to onset of miosis. Upon detection of chemical agents, the detector provides local and remote audible and visual alarms to the operators. Advance warning will provide the vehicle crew and other personnel in the local area with the time necessary to protect themselves from the lethal effects of chemical agents. The JCAD is capable of being upgraded to protect against future chemical agent threats. The JCAD provides the operator with the warning necessary to survive and fight in a chemical warfare agent threat environment.
NASA Astrophysics Data System (ADS)
Snarski, Steve; Menozzi, Alberico; Sherrill, Todd; Volpe, Chris; Wille, Mark
2010-04-01
This paper describes experimental results from recent live-fire data collects that demonstrate the capability of a prototype system for projectile detection and tracking. This system, which is being developed at Applied Research Associates, Inc., under the FightSight program, consists of a high-speed thermal camera and sophisticated image processing algorithms to detect and track projectiles. The FightSight operational vision is automated situational intelligence to detect, track, and graphically map large-scale firefights and individual shooting events onto command and control (C2) systems in real time (shot location and direction, weapon ID, movements and trends). Gaining information on enemy-fire trajectories allows educated inferences on the enemy's intent, disposition, and strength. Our prototype projectile detection and tracking system has been tested at the Joint Readiness Training Center (Ft Polk, LA) during live-fire convoy and mortar registration exercises, in the summer of 2009. It was also tested during staged military-operations- on-urban-terrain (MOUT) firefight events at Aberdeen Test Center (Aberdeen, MD) under the Hostile Fire Defeat Army Technology Objective midterm experiment, also in the summer of 2009, where we introduced fusion with acoustic and EO sensors to provide 3D localization and near-real time display of firing events. Results are presented in this paper that demonstrate effective and accurate detection and localization of weapon fire (5.56mm, 7.62mm, .50cal, 81/120mm mortars, 40mm) in diverse and challenging environments (dust, heat, day and night, rain, arid open terrain, urban clutter). FightSight's operational capabilities demonstrated under these live-fire data collects can support closecombat scenarios. As development continues, FightSight will be able to feed C2 systems with a symbolic map of enemy actions.
Development of an ultra wide band microwave radar based footwear scanning system
NASA Astrophysics Data System (ADS)
Rezgui, Nacer Ddine; Bowring, Nicholas J.; Andrews, David A.; Harmer, Stuart W.; Southgate, Matthew J.; O'Reilly, Dean
2013-10-01
At airports, security screening can cause long delays. In order to speed up screening a solution to avoid passengers removing their shoes to have them X-ray scanned is required. To detect threats or contraband items hidden within the shoe, a method of screening using frequency swept signals between 15 to 40 GHz has been developed, where the scan is carried out whilst the shoes are being worn. Most footwear is transparent to microwaves to some extent in this band. The scans, data processing and interpretation of the 2D image of the cross section of the shoe are completed in a few seconds. Using safe low power UWB radar, scattered signals from the shoe can be observed which are caused by changes in material properties such as cavities, dielectric or metal objects concealed within the shoe. By moving the transmission horn along the length of the shoe a 2D image corresponding to a cross section through the footwear is built up, which can be interpreted by the user, or automatically, to reveal the presence of concealed threat within the shoe. A prototype system with a resolution of 6 mm or less has been developed and results obtained for a wide range of commonly worn footwear, some modified by the inclusion of concealed material. Clear differences between the measured images of modified and unmodified shoes are seen. Procedures for enhancing the image through electronic image synthesis techniques and image processing methods are discussed and preliminary performance data presented.
NASA Astrophysics Data System (ADS)
Ziegler, James
2017-01-01
After the Iraq war started in 2003, within 15 months over 60% of the US casualties were being caused by a weapon that had never been significant in previous conflicts: the Improvised Explosive Device (IED). These are explosive mines that are mostly concealed at night near roads, and then detonated the next day when combatant vehicles are driven by. This talk will discuss the history of IEDs, and then concentrate on the use of IEDs in Iraq. The political decisions that may have led to the high fatality rate in Iraq will be outlined. Of note, contrasting political decisions in Afghanistan led to IED's causing fewer than 20% of the casualties there, although the number of IED's exceeded that in Iraq. Because of the terrible consequences in Iraq, with no effective available remedy, IED Countermeasures was proposed as ideal for student engineering research projects. Over five years, student work to develop a technology for ``Remote IED Deactivation without Detonation'' will be outlined (they were very successful !). They used high power beams of RF, electrons, protons and neutrons to attempt deactivation at a 100' distance. The final IED Neutralizer was very successfully field tested. (This talk will contain graphic videos, and is not for the squeamish.)
NASA Astrophysics Data System (ADS)
Booske, John H.
2008-05-01
Homeland security and military defense technology considerations have stimulated intense interest in mobile, high power sources of millimeter-wave (mmw) to terahertz (THz) regime electromagnetic radiation, from 0.1 to 10THz. While vacuum electronic sources are a natural choice for high power, the challenges have yet to be completely met for applications including noninvasive sensing of concealed weapons and dangerous agents, high-data-rate communications, high resolution radar, next generation acceleration drivers, and analysis of fluids and condensed matter. The compact size requirements for many of these high frequency sources require miniscule, microfabricated slow wave circuits. This necessitates electron beams with tiny transverse dimensions and potentially very high current densities for adequate gain. Thus, an emerging family of microfabricated, vacuum electronic devices share many of the same plasma physics challenges that are currently confronting "classic" high power microwave (HPM) generators including long-life bright electron beam sources, intense beam transport, parasitic mode excitation, energetic electron interaction with surfaces, and rf air breakdown at output windows. The contemporary plasma physics and other related issues of compact, high power mmw-to-THz sources are compared and contrasted to those of HPM generation, and future research challenges and opportunities are discussed.
A Crime Scene Fabricated as Suicide.
Amararatne, Rrg Sriyantha; Vidanapathirana, Muditha
2017-02-01
When ascertaining the manner of death, the forensic pathologist should be careful, because in some instances, attempts are made by the criminals to conceal homicides as suicides. The case under discussion highlights the contribution of the forensic pathologist in the ascertainment of the manner in firearm deaths. The deceased was a poacher and his dead body was found in a cashew land with his shotgun lying over him. The shirt had a roughly circular defect with muzzle mark, and burnt and blackened margin. Beneath that, on front of the left upper chest a 2cm diameter circular, perforated laceration, with muzzle imprint and, burnt and blackened margin was found. Shelving was found at the upper margin. Chest X-ray showed the downward pellet distribution. Cause of death was chest injuries due to pellets discharged from a smooth bore weapon. Length of the upper arm reach was 65cm (25 inches) and the length from the muzzle to the trigger was 79cm (31 inches). In conclusion, it was found to be a fabricated suicide scene and the manner of death was ascertained as homicide. This reiterates that the postmortem investigation of firearm deaths should be performed or conducted under direct supervision of forensic specialist to deliver justice.
A Crime Scene Fabricated as Suicide
Amararatne, RRG Sriyantha
2017-01-01
When ascertaining the manner of death, the forensic pathologist should be careful, because in some instances, attempts are made by the criminals to conceal homicides as suicides. The case under discussion highlights the contribution of the forensic pathologist in the ascertainment of the manner in firearm deaths. The deceased was a poacher and his dead body was found in a cashew land with his shotgun lying over him. The shirt had a roughly circular defect with muzzle mark, and burnt and blackened margin. Beneath that, on front of the left upper chest a 2cm diameter circular, perforated laceration, with muzzle imprint and, burnt and blackened margin was found. Shelving was found at the upper margin. Chest X-ray showed the downward pellet distribution. Cause of death was chest injuries due to pellets discharged from a smooth bore weapon. Length of the upper arm reach was 65cm (25 inches) and the length from the muzzle to the trigger was 79cm (31 inches). In conclusion, it was found to be a fabricated suicide scene and the manner of death was ascertained as homicide. This reiterates that the postmortem investigation of firearm deaths should be performed or conducted under direct supervision of forensic specialist to deliver justice. PMID:28384886
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taslitt, N.
1985-09-01
The objectives of this project were to (1) determine whether the radiation from a nuclear weapon can disable various arming and fuzing components by causing permanent damage; (2) determine whether transient nuclear radiation can induce an operating fuze to malfunction; and (3) compare nuclear weapon radiation effects with those produced by various radiation simulators. Data obtained revealed that none of the inertial components were detrimentally affected. The electronic components were severely degraded but would have satisfactorily accomplished their tactical functions. No electromagnetic effects were detected.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rosenthal, M.D.; Saum-Manning, L.; Houck, F.
Events in Iraq at the beginning of the 1990s demonstrated that the safeguards system of the International Atomic Energy Agency (IAEA) needed to be improved. It had failed, after all, to detect Iraq's clandestine nuclear weapon program even though some of Iraq's's activities had been pursued at inspected facilities in buildings adjacent to ones being inspected by the IAEA. Although there were aspects of the implementation of safeguards where the IAEA needed to improve, the primary limitations were considered to be part of the safeguards system itself. That system was based on the Nuclear Nonproliferation Treaty of 1970, to whichmore » Iraq was a party, and implemented on the basis of a model NPT safeguards agreement, published by the IAEA 1972 as INFCIRC/153 (corrected). The agreement calls for states to accept and for the IAEA to apply safeguards to all nuclear material in the state. Iraq was a party to such an agreement, but it violated the agreement by concealing nuclear material and other nuclear activities from the IAEA. Although the IAEA was inspecting in Iraq, it was hindered by aspects of the agreement that essentially limited its access to points in declared facilities and provided the IAEA with little information about nuclear activities anywhere else in Iraq. As a result, a major review of the NPT safeguards system was initiated by its Director General and Member States with the objective of finding the best means to enable the IAEA to detect both diversions from declared stocks and any undeclared nuclear material or activities in the state. Significant improvements that could be made within existing legal authority were taken quickly, most importantly a change in 1992 in how and when and what design information would be reported to the IAEA. During 1991-1996, the IAEA pursued intensive study, legal and technical analysis, and field trials and held numerous consultations with Member States. The Board of Governors discussed the issue of strengthening safeguards at almost all of its meeting.« less
Relationship authenticity partially mediates the effects of attachment on relationship satisfaction.
Rasco, Danney; Warner, Rebecca M
2017-01-01
Individuals with anxious and avoidant attachment tend to experience less satisfaction in their relationships. Past research suggests the negative effects of attachment on relationship satisfaction may be partially mediated by self-disclosure and self-concealment; the present study evaluated relationship authenticity as a potential additional mediator. Confirmatory factor analysis indicated that relationship authenticity is distinct from self-disclosure and self-concealment. Relationship authenticity predicted additional variance in relationship satisfaction controlling for attachment, self-disclosure, and self-concealment. The results were consistent with relationship authenticity, along with self-disclosure and self-concealment, partially mediating the effects of attachment on relationship satisfaction. These findings suggest that relationship authenticity may play a unique role in understanding how attachment influences relationship satisfaction. Theoretical and clinical implications are discussed.
NASA Astrophysics Data System (ADS)
Rojali, Siahaan, Ida Sri Rejeki; Soewito, Benfano
2017-08-01
Steganography is the art and science of hiding the secret messages so the existence of the message cannot be detected by human senses. The data concealment is using the Multi Pixel Value Differencing (MPVD) algorithm, utilizing the difference from each pixel. The development was done by using six interval tables. The objective of this algorithm is to enhance the message capacity and to maintain the data security.
C-130 Corrosion Prevention and Control Program
2011-08-01
hexavalent chrome … Warner Robins Air Logistics Center People First…Mission Always SIBR Projects Back Scatter X-Ray NDI Detect concealed...Projects Listing Future Projects Chrome -Free Coating Systems Flight Tests • AkzoNobel (Sep-Oct 2011) – PreKote – Aerodur 2100 magnesium rich...primer (MgRP) – Aerodur 5000 topcoat color #36173 • Deft (June 2012) – Rare earth conversion coating (RECC) 1015/3021 – 02-GN-093 chrome -free
Role of radiology in a national initiative to interdict drug smuggling: the Dutch experience.
Algra, Paul R; Brogdon, Byron G; Marugg, Roque C
2007-08-01
The purpose of this pictorial essay is to describe the role of radiology in a national initiative to intercept illegal narcotics concealed within the bodies of human transporters. Radiologic examination is increasingly important in identifying intracorporeal drug smuggling as improved wrapping techniques undermine the usefulness of blood and urine testing and clinical observation. Detection rates of high accuracy, sensitivity, and specificity are achieved by experienced radiologists.
Expanded opportunities of THz passive camera for the detection of concealed objects
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.
2013-10-01
Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.
Gómez-Serrano, Miguel Ángel; López-López, Pascual
2014-01-01
Predation is one of the main causes of adult mortality and breeding failure for ground-nesting birds. Micro-habitat structure around nests plays a critical role in minimizing predation risk. Plovers nest in sites with little vegetation cover to maximize the incubating adult visibility, but many studies suggest a trade-off between nest-crypsis and predator detection strategies. However, this trade-off has not been explored in detail because methods used so far do not allow estimating the visibility with regards to critical factors such as slope or plant permeability to vision. Here, we tested the hypothesis that Kentish plovers select exposed sites according to a predator detection strategy, and the hypothesis that more concealed nests survive longer according to a crypsis strategy. To this end, we obtained an accurate estimation of the incubating adult's field of vision through a custom built inverted periscope. Our results showed that plovers selected nest sites with higher visibility than control points randomly selected with regards to humans and dogs, although nests located in sites with higher vegetation cover survived longer. In addition, the flushing distance (i.e., the distance at which incubating adults leave the nest when they detect a potential predator) decreased with vegetation cover. Consequently, the advantages of concealing the nest were limited by the ability to detect predators, thus indirectly supporting the existence of the trade-off between crypsis and predator detection. Finally, human disturbance also constrained nest choice, forcing plovers to move to inland sites that were less suitable because of higher vegetation cover, and modulated flushing behavior, since plovers that were habituated to humans left their nests closer to potential predators. This constraint on the width of suitable breeding habitat is particularly relevant for the conservation of Kentish Plover in sand beaches, especially under the current context of coastal regression and increase of recreational activities.
Gómez-Serrano, Miguel Ángel; López-López, Pascual
2014-01-01
Predation is one of the main causes of adult mortality and breeding failure for ground-nesting birds. Micro-habitat structure around nests plays a critical role in minimizing predation risk. Plovers nest in sites with little vegetation cover to maximize the incubating adult visibility, but many studies suggest a trade-off between nest-crypsis and predator detection strategies. However, this trade-off has not been explored in detail because methods used so far do not allow estimating the visibility with regards to critical factors such as slope or plant permeability to vision. Here, we tested the hypothesis that Kentish plovers select exposed sites according to a predator detection strategy, and the hypothesis that more concealed nests survive longer according to a crypsis strategy. To this end, we obtained an accurate estimation of the incubating adult's field of vision through a custom built inverted periscope. Our results showed that plovers selected nest sites with higher visibility than control points randomly selected with regards to humans and dogs, although nests located in sites with higher vegetation cover survived longer. In addition, the flushing distance (i.e., the distance at which incubating adults leave the nest when they detect a potential predator) decreased with vegetation cover. Consequently, the advantages of concealing the nest were limited by the ability to detect predators, thus indirectly supporting the existence of the trade-off between crypsis and predator detection. Finally, human disturbance also constrained nest choice, forcing plovers to move to inland sites that were less suitable because of higher vegetation cover, and modulated flushing behavior, since plovers that were habituated to humans left their nests closer to potential predators. This constraint on the width of suitable breeding habitat is particularly relevant for the conservation of Kentish Plover in sand beaches, especially under the current context of coastal regression and increase of recreational activities. PMID:25208045
Computer vision techniques for rotorcraft low altitude flight
NASA Technical Reports Server (NTRS)
Sridhar, Banavar
1990-01-01
Rotorcraft operating in high-threat environments fly close to the earth's surface to utilize surrounding terrain, vegetation, or manmade objects to minimize the risk of being detected by an enemy. Increasing levels of concealment are achieved by adopting different tactics during low-altitude flight. Rotorcraft employ three tactics during low-altitude flight: low-level, contour, and nap-of-the-earth (NOE). The key feature distinguishing the NOE mode from the other two modes is that the whole rotorcraft, including the main rotor, is below tree-top whenever possible. This leads to the use of lateral maneuvers for avoiding obstacles, which in fact constitutes the means for concealment. The piloting of the rotorcraft is at best a very demanding task and the pilot will need help from onboard automation tools in order to devote more time to mission-related activities. The development of an automation tool which has the potential to detect obstacles in the rotorcraft flight path, warn the crew, and interact with the guidance system to avoid detected obstacles, presents challenging problems. Research is described which applies techniques from computer vision to automation of rotorcraft navigtion. The effort emphasizes the development of a methodology for detecting the ranges to obstacles in the region of interest based on the maximum utilization of passive sensors. The range map derived from the obstacle-detection approach can be used as obstacle data for the obstacle avoidance in an automatic guidance system and as advisory display to the pilot. The lack of suitable flight imagery data presents a problem in the verification of concepts for obstacle detection. This problem is being addressed by the development of an adequate flight database and by preprocessing of currently available flight imagery. The presentation concludes with some comments on future work and how research in this area relates to the guidance of other autonomous vehicles.
NASA Astrophysics Data System (ADS)
Mackie, Ryan S.; Schilling, Amanda S.; Lopez, Arturo M.; Rayms-Keller, Alfredo
2002-02-01
Detection of multiple chemical and biological weapons (CBW) agents and/or complex mixtures of toxic industrial chemicals (TIC) is imperative for both the commercial and military sectors. In a military scenario, a multi-CBW attack would create confusion, thereby delaying decontamination and therapeutic efforts. In the commercial sector, polluted sites invariably contain a mixture of TIC. Novel detection systems capable of detecting CBW and TIC are sorely needed. While it may be impossible to build a detector capable of discriminating all the possible combinations of CBW, a detection system capable of statistically predicting the most likely composition of a given mixture is within the reach of current emerging technologies. Aquatic insect-gene activity may prove to be a sensitive, discriminating, and elegant paradigm for the detection of CBW and TIC. We propose to systematically establish the expression patterns of selected protein markers in insects exposed to specific mixtures of chemical and biological warfare agents to generate a library of biosignatures of exposure. The predicting capabilities of an operational library of biosignatures of exposures will allow the detection of emerging novel or genetically engineered agents, as well as complex mixtures of chemical and biological weapons agents. CBW and TIC are discussed in the context of war, terrorism, and pollution.
Soldier detection using unattended acoustic and seismic sensors
NASA Astrophysics Data System (ADS)
Naz, P.; Hengy, S.; Hamery, P.
2012-06-01
During recent military conflicts, as well as for security interventions, the urban zone has taken a preponderant place. Studies have been initiated in national and in international programs to stimulate the technical innovations for these specific scenarios. For example joint field experiments have been organized by the NATO group SET-142 to evaluate the capability for the detection and localization of snipers, mortars or artillery guns using acoustic devices. Another important operational need corresponds to the protection of military sites or buildings. In this context, unattended acoustic and seismic sensors are envisaged to contribute to the survey of specific points by the detection of approaching enemy soldiers. This paper describes some measurements done in an anechoic chamber and in free field to characterize typical sounds generated by the soldier activities (walking, crawling, weapon handling, radio communication, clothing noises...). Footstep, speech and some specific impulsive sounds are detectable at various distances from the source. Such detection algorithms may be easily merged with the existing weapon firing detection algorithms to provide a more generic "battlefield acoustic" early warning system. Results obtained in various conditions (grassy terrain, gravel path, road, forest) will be presented. A method to extrapolate the distances of detection has been developed, based on an acoustic propagation model and applied to the laboratory measurements.
10th Annual Systems Engineering Conference: Volume 2 Wednesday
2007-10-25
intelligently optimize resource performance. Self - Healing Detect hardware/software failures and reconfigure to permit continued operations. Self ...Types Wake Ice WEAPON/PLATFORM ACOUSTICS Self -Noise Radiated Noise Beam Forming Pulse Types Submarines, surface ships, and platform sensors P r o p P r o...Computing Self -Protecting Detect internal/external attacks and protect it’s resources from exploitation. Self -Optimizing Detect sub-optimal behaviors and
H2LIFT: global navigation simulation ship tracking and WMD detection in the maritime domain
NASA Astrophysics Data System (ADS)
Wyffels, Kevin
2007-04-01
This paper presents initial results for a tracking simulation of multiple maritime vehicles for use in a data fusion program detecting Weapons of Mass Destruction (WMD). This simulation supports a fusion algorithm (H2LIFT) for collecting and analyzing data providing a heuristic analysis tool for detecting weapons of mass destruction in the maritime domain. Tools required to develop a navigational simulation fitting a set of project objectives are introduced for integration into the H2LIFT algorithm. Emphasis is placed on the specific requirements of the H2LIFT project, however the basic equations, algorithms, and methodologies can be used as tools in a variety of scenario simulations. Discussion will be focused on track modeling (e.g. position tracking of ships), navigational techniques, WMD detection, and simulation of these models using Matlab and Simulink. Initial results provide absolute ship position data for a given multi-ship maritime scenario with random generation of a given ship containing a WMD. Required coordinate systems, conversions between coordinate systems, Earth modeling techniques, and navigational conventions and techniques are introduced for development of the simulations.
A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.
Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo
2015-06-19
Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.
Motion compensated shape error concealment.
Schuster, Guido M; Katsaggelos, Aggelos K
2006-02-01
The introduction of Video Objects (VOs) is one of the innovations of MPEG-4. The alpha-plane of a VO defines its shape at a given instance in time and hence determines the boundary of its texture. In packet-based networks, shape, motion, and texture are subject to loss. While there has been considerable attention paid to the concealment of texture and motion errors, little has been done in the field of shape error concealment. In this paper we propose a post-processing shape error concealment technique that uses the motion compensated boundary information of the previously received alpha-plane. The proposed approach is based on matching received boundary segments in the current frame to the boundary in the previous frame. This matching is achieved by finding a maximally smooth motion vector field. After the current boundary segments are matched to the previous boundary, the missing boundary pieces are reconstructed by motion compensation. Experimental results demonstrating the performance of the proposed motion compensated shape error concealment method, and comparing it with the previously proposed weighted side matching method are presented.
Cancer survivors' concealment or disclosure of diagnosis: Implications for return to work.
Morrison, T L; Thomas, R L
2015-01-01
The ability to return to work (RTW) is a significant quality of life indicator for many working aged cancer survivors. In the void of available support, many are left to independently navigate the RTW process which includes such important considerations as disclosure or concealment of diagnosis with concomitant sequellae. This article reviews participants' variable approaches to concealment, disclosure, or even an open educative stance as well as the associated benefits and limitations. Photovoice methods combined with interviewing. While most participants disclosed their diagnosis and many extolled the benefits of an open, educative stance, there were drawbacks experienced. Similarly, those who concealed their diagnosis also experienced benefits and challenges. In the current void of appropriate cancer rehabilitation supports, cancer survivors must independently negotiate their RTW process. Although most participants openly disclosed their diagnosis and associated limitations, a few concealed or camouflaged. There are benefits and limitations to both approaches of which survivors should be made aware at the outset as such will shape their RTW experience. Multidisciplinary rehabilitation support services would best guide survivors' management of the myriad of factors that will impact their work reintegration.
Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François
2013-01-01
We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040
Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François
2013-01-01
We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.
Multi-sensor millimeter-wave system for hidden objects detection by non-collaborative screening
NASA Astrophysics Data System (ADS)
Zouaoui, Rhalem; Czarny, Romain; Diaz, Frédéric; Khy, Antoine; Lamarque, Thierry
2011-05-01
In this work, we present the development of a multi-sensor system for the detection of objects concealed under clothes using passive and active millimeter-wave (mmW) technologies. This study concerns both the optimization of a commercial passive mmW imager at 94 GHz using a phase mask and the development of an active mmW detector at 77 GHz based on synthetic aperture radar (SAR). A first wide-field inspection is done by the passive imager while the person is walking. If a suspicious area is detected, the active imager is switched-on and focused on this area in order to obtain more accurate data (shape of the object, nature of the material ...).
NASA Astrophysics Data System (ADS)
Slaughter, D. R.; Accatino, M. R.; Bernstein, A.; Church, J. A.; Descalle, M. A.; Gosnell, T. B.; Hall, J. M.; Loshak, A.; Manatt, D. R.; Mauger, G. J.; Moore, T. L.; Norman, E. B.; Pohl, B. A.; Pruet, J. A.; Petersen, D. C.; Walling, R. S.; Weirup, D. L.; Prussin, S. G.; McDowell, M.
2005-12-01
A concept for detecting the presence of special nuclear material (235U or 239Pu) concealed in intermodal cargo containers is described. It is based on interrogation with a pulsed beam of 7 MeV neutrons that produce fission events and their β-delayed neutron emission or β-delayed high-energy γ radiation between beam pulses provide the detection signature. Fission product β-delayed γ-rays above 3 MeV are nearly 10 times more abundant than β-delayed neutrons and are distinct from natural radioactivity and from nearly all of the induced activity in a normal cargo. Detector backgrounds and potential interferences with the fission signature radiation have been identified and quantified.
DOE Office of Scientific and Technical Information (OSTI.GOV)
T. O. Tuemer; L. Doan; C. W. Su
2000-06-04
This paper describes the design and operation of a Compact Integrated Narcotics Detection Instrument (CINDI), which utilizes neutrons emitted from {sup 252}Cf. Neutrons emitted from the front face of CINDI penetrate dense compartment barrier materials with little change in energy but are backscattered by hydrogen-rich materials such as drugs. CINDI has led to a new technology that shows promise for identifying the concealed contraband. Carriers such as vehicles, marine vessels, airplanes, containers, cargo, and luggage will be scanned using both neutron and gamma-ray sources. The signal from both the neutron and gamma-ray backscattering and/or transmission can be used simultaneously tomore » detect and possibly identify the contrabands it has been trained for.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scribner, R.A.
Sea-launched cruise missiles (SLCMs) present some particularly striking problems for both national security and arms control. These small, dual-purpose, difficult to detect weapons present some formidable challenges for verification in any scheme that attempts to limit rather than eliminate them. Conventionally armed SLCMs offer to the navies of both superpowers important offensive and defensive capabilities. Nuclear armed, long-range, land-attack SLCMs, on the other hand, seem to pose destabilizing threats and otherwise have questionable value, despite strong US support for extensive deployment of them. If these weapons are not constrained, their deployment could circumvent gains which might be made in agreementsmore » directly reducing of strategic nuclear weapons. This paper reviews the technology and planned deployments of SLCMs, the verification schemes which have been discussed and are being investigated to try to deal with the problem, and examines the proposed need for and possible uses of SLCMs. It presents an overview of the problem technically, militarily, and politically.« less
Science & Technology Review January/February 2010
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bearinger, J P
2009-11-30
This month's issue has the following articles: (1) Innovative Materials Rise to the Radiation Challenge - Commentary by Bruce Warner; (2) The Hunt for Better Radiation Detection - New materials will help radiation detectors pick up weak signals and accurately identify illicit radioactive sources; (3) Time-Critical Technology Identifies Deadly Bloodborne Pathogens - A portable device can simultaneously distinguish up to five bloodborne pathogens in just minutes; (4) Defending Computer Networks against Attack - A Laboratory effort takes a new approach to detecting increasingly sophisticated cyber attacks; and (5) Imaging Cargo's Inner Secrets - Livermore-University of California collaborators are modeling amore » new radiographic technique for identifying nuclear materials concealed inside cargo containers.« less
Powell, J.; Reich, M.; Danby, G.
1997-07-22
A magnetic imager includes a generator for practicing a method of applying a background magnetic field over a concealed object, with the object being effective to locally perturb the background field. The imager also includes a sensor for measuring perturbations of the background field to detect the object. In one embodiment, the background field is applied quasi-statically. And, the magnitude or rate of change of the perturbations may be measured for determining location, size, and/or condition of the object. 25 figs.
2014-07-09
Rivera. Highly Sensitive Filter Paper Substrate for SERS Trace Explosives Detection , International Journal of Spectroscopy, (09 2012): 0. doi: 10.1155...Highly Sensitive Filter Paper Substrate for SERS Field Detection of Trace Threat Chemicals”, PITTCON-2013: Forensic Analysis in the Lab and Crime Scene...the surface. In addition, built-in algorithms were used for nearly real-time sample detection . Trace and bulk concentrations of the other substances
Director, Operational Test and Evaluation FY 2004 Annual Report
2004-01-01
HIGH) Space Based Radar (SBR) Sensor Fuzed Weapon (SFW) P3I (CBU-97/B) Small Diameter Bomb (SDB) Secure Mobile Anti-Jam Reliable Tactical Terminal...detection, identification, and sampling capability for both fixed-site and mobile operations. The system must automatically detect and identify up to ten...staffing within the Services. SYSTEM DESCRIPTION AND MISSION The Services envision JCAD as a hand-held device that automatically detects, identifies, and
NASA Astrophysics Data System (ADS)
Johnson, J. Bruce; Reeve, S. W.; Burns, W. A.; Allen, Susan D.
2010-04-01
Termed Special Nuclear Material (SNM) by the Atomic Energy Act of 1954, fissile materials, such as 235U and 239Pu, are the primary components used to construct modern nuclear weapons. Detecting the clandestine presence of SNM represents an important capability for Homeland Security. An ideal SNM sensor must be able to detect fissile materials present at ppb levels, be able to distinguish between the source of the detected fissile material, i.e., 235U, 239Pu, 233U or other fission source, and be able to perform the discrimination in near real time. A sensor with such capabilities would provide not only rapid identification of a threat but, ultimately, information on the potential source of the threat. For example, current detection schemes for monitoring clandestine nuclear testing and nuclear fuel reprocessing to provide weapons grade fissile material rely largely on passive air sampling combined with a subsequent instrumental analysis or some type of wet chemical analysis of the collected material. It would be highly useful to have a noncontact method of measuring isotopes capable of providing forensic information rapidly at ppb levels of detection. Here we compare the use of Kr, Xe and I as "canary" species for distinguishing between 235U and 239Pu fission sources by spectroscopic methods.
Subject-based discriminative sparse representation model for detection of concealed information.
Akhavan, Amir; Moradi, Mohammad Hassan; Vand, Safa Rafiei
2017-05-01
The use of machine learning approaches in concealed information test (CIT) plays a key role in the progress of this neurophysiological field. In this paper, we presented a new machine learning method for CIT in which each subject is considered independent of the others. The main goal of this study is to adapt the discriminative sparse models to be applicable for subject-based concealed information test. In order to provide sufficient discriminability between guilty and innocent subjects, we introduced a novel discriminative sparse representation model and its appropriate learning methods. For evaluation of the method forty-four subjects participated in a mock crime scenario and their EEG data were recorded. As the model input, in this study the recurrence plot features were extracted from single trial data of different stimuli. Then the extracted feature vectors were reduced using statistical dependency method. The reduced feature vector went through the proposed subject-based sparse model in which the discrimination power of sparse code and reconstruction error were applied simultaneously. Experimental results showed that the proposed approach achieved better performance than other competing discriminative sparse models. The classification accuracy, sensitivity and specificity of the presented sparsity-based method were about 93%, 91% and 95% respectively. Using the EEG data of a single subject in response to different stimuli types and with the aid of the proposed discriminative sparse representation model, one can distinguish guilty subjects from innocent ones. Indeed, this property eliminates the necessity of several subject EEG data in model learning and decision making for a specific subject. Copyright © 2017 Elsevier B.V. All rights reserved.
IMPROVED TECHNNOLOGY TO PREVENT ILLICIT TRAFFICKING IN NUCLEAR MATERIALS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Richardson, J H
2005-07-20
The proliferation of nuclear, chemical, and biological weapons (collectively known as weapons of mass destruction, or WMD) and the potential acquisition and use of WMD against the world by terrorists are extremely serious threats to international security. These threats are complex and interrelated. There are myriad routes to weapons of mass destruction--many different starting materials, material sources, and production processes. There are many possible proliferators--threshold countries, rogue states, state-sponsored or transnational terrorists groups, domestic terrorists, and even international crime organizations. Motives for acquiring and using WMD are similarly wide ranging--from a desire to change the regional power balance, deny accessmore » to a strategic area, or alter international policy to extortion, revenge, or hate. Because of the complexity of this threat landscape, no single program, technology, or capability--no silver bullet--can solve the WMD proliferation and terrorism problem. An integrated program is needed that addresses the WMD proliferation and terrorism problem from end to end, from prevention to detection, reversal, and response, while avoiding surprise at all stages, with different activities directed specifically at different types of WMD and proliferators. Radiation detection technologies are an important tool in the prevention of proliferation. A variety of new developments have enabled enhanced performance in terms of energy resolution, spatial resolution, predictive modeling and simulation, active interrogation, and ease of operation and deployment in the field. The radiation properties of nuclear materials, particularly highly enriched uranium (HEU), make the detection of smuggled nuclear materials technically difficult. A number of efforts are under way to devise improved detector materials and instruments and to identify novel signatures that could be detected. Key applications of this work include monitoring for radioactive materials at choke points, searching for nuclear materials, and developing instruments for response personnel.« less
Knowledge of display rules in prelingually deaf and hearing children.
Hosie, J A; Russell, P A; Gray, C D; Scott, C; Hunter, N; Banks, J S; Macaulay, M C
2000-03-01
Deaf children of elementary and secondary school age participated in a study designed to examine their understanding of display rules, the principles governing the expression and concealment of emotion in social situations. The results showed that deaf children's knowledge of display rules, as measured by their reported concealment of emotion, was comparable to that of hearing children of the same age. However, deaf children were less likely to report that they would conceal happiness and anger. They were also less likely to produce reasons for concealing emotion and a smaller proportion of their reasons were prosocial, that is, relating to the feelings of others. The results suggest that the understanding of display rules (which function to protect the feelings of other people) may develop more gradually in deaf children raised in a spoken language environment than it does in hearing children.
Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech
2013-10-01
The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.
Aum Shinrikyo's Chemical and Biological Weapons: More Than Sarin.
Tu, A T
2014-07-01
The radical religious group Aum Shinrikyo was founded in Japan in the 1980s and grew rapidly in the 1990s. Aum members perpetrated a mass murder in Matsumoto City in 1994, where they used sarin as a chemical weapon to poison approximately 500 civilians. On March 20, 1995, Aum deployed sarin in an even larger terrorist attack on the Tokyo Subway System, which poisoned some 6,000 people. After the Tokyo Subway attack, the Japanese Police arrested the sect's senior members. From 2005 through 2011, 13 of these senior members were sentenced to death. In this article, aspects of Aum's chemical and biological terrorism are reviewed. Sarin production efforts by the sect are described, including how the degradation product of sarin in soil, methylphosphonic acid, enabled the detection of sarin production sites. Also, Aum's chemical-warfare agents other than sarin are described, as are its biological weapons. The author was permitted by the Japanese government to interview Dr. Tomomasa Nakagawa, one of the senior members of Aum Shinrikyo. From Dr. Nakagawa the author obtained valuable inside information about Aum's chemical and biological weapons programs. Copyright © 2014 Central Police University.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Albright, D.
1995-07-01
This year, the nuclear proliferation spotlight has swung away from Iraq and North Korea, only to focus on Iran. Western intelligence agencies have assembled a substantial body of evidence suggesting that, although Iran signed the Nuclear Non-Proliferation Treaty (NPT), it is secretly pursuing a broad, organized effort to develop nuclear weapons. US officials say that Iran is attempting to acquire nuclear technologies that are not consistent with a strictly peaceful program. Intelligence agencies have detected procurement patterns that point to a weapons program. Iran has a multifaceted strategy to develop options to make nuclear weapons: Iran has sought, with limitedmore » success, to buy nuclear power and research facilities from many countries, particularly China and Russia; Iran has shopped quietly in many countries, particularly in Western and Eastern Europe, for a wide range of nuclear-related or dual-use nuclear items that might enable it to put together facilities to enrich uranium, separate plutonium, and make nuclear weapons. There is little public information about how effective this clandestine shopping has been or which countries have been contacted; There is no evidence that Iran has bought any fissile material - but not for wont of trying, and the matter continues to be scrutinized very closely.« less
Concealing with structured light.
Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M
2014-02-13
While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.
Cycles of abuse nurtured by concealment: a clinical report.
Wijma, Barbro; Thapar-Björkert, Suruchi; Hammarström, Nevija Cah; Swahnberg, Katarina
2007-09-01
At present, health care staff do not seem to have sufficient knowledge about their patients' abusive experiences. The aim of the present study is to analyze and discuss what the implications might be for the encounter between patients and health care professionals, when experiences of abuse are concealed. The methodology of this article is varied: a personal narrative, medical records, sociological theoretical literature and empirical evidence. From the narrative we learn that concealment of abuse was devastating for the patient. She was "treated" in vain as a correct diagnosis was not made, while abuse by her father continued. Health care staff also violated her, which she told her therapist, but her protests were not acknowledged. Ten years of treatment thus made her even more sick. This case story focuses on the mechanisms which nurture concealment of a patient's history of abuse, such as structural and symbolic violence. We also suggest ways to break "cycles of abuse". Help the patient to stop concealing also means that she/he leaves a victim role, gets in charge of the situation and takes a first step towards empowerment. In this way, health care settings can become enabling and empowering environments.
Through-barrier electromagnetic imaging with an atomic magnetometer.
Deans, Cameron; Marmugi, Luca; Renzoni, Ferruccio
2017-07-24
We demonstrate the penetration of thick metallic and ferromagnetic barriers for imaging of conductive targets underneath. Our system is based on an 85 Rb radio-frequency atomic magnetometer operating in electromagnetic induction imaging modality in an unshielded environment. Detrimental effects, including unpredictable magnetic signatures from ferromagnetic screens and variations in the magnetic background, are automatically compensated by active compensation coils controlled by servo loops. We exploit the tunability and low-frequency sensitivity of the atomic magnetometer to directly image multiple conductive targets concealed by a 2.5 mm ferromagnetic steel shield and/or a 2.0 mm aluminium shield, in a single scan. The performance of the atomic magnetometer allows imaging without any prior knowledge of the barriers or the targets, and without the need of background subtraction. A dedicated edge detection algorithm allows automatic estimation of the targets' size within 3.3 mm and of their position within 2.4 mm. Our results prove the feasibility of a compact, sensitive and automated sensing platform for imaging of concealed objects in a range of applications, from security screening to search and rescue.
Calibration, reconstruction, and rendering of cylindrical millimeter-wave image data
NASA Astrophysics Data System (ADS)
Sheen, David M.; Hall, Thomas E.
2011-05-01
Cylindrical millimeter-wave imaging systems and technology have been under development at the Pacific Northwest National Laboratory (PNNL) for several years. This technology has been commercialized, and systems are currently being deployed widely across the United States and internationally. These systems are effective at screening for concealed items of all types; however, new sensor designs, image reconstruction techniques, and image rendering algorithms could potentially improve performance. At PNNL, a number of specific techniques have been developed recently to improve cylindrical imaging methods including wideband techniques, combining data from full 360-degree scans, polarimetric imaging techniques, calibration methods, and 3-D data visualization techniques. Many of these techniques exploit the three-dimensionality of the cylindrical imaging technique by optimizing the depth resolution of the system and using this information to enhance detection. Other techniques, such as polarimetric methods, exploit scattering physics of the millimeter-wave interaction with concealed targets on the body. In this paper, calibration, reconstruction, and three-dimensional rendering techniques will be described that optimize the depth information in these images and the display of the images to the operator.
NASA Astrophysics Data System (ADS)
Wilson, Rod; Brittain, Alan H.
1997-01-01
When a vehicle is used to transport narcotic contraband material trace levels of that material can be found on surfaces of the vehicle, people associated with the vehicle and surface they contact. The detection of these trace levels can help to target vehicles associated with the smuggling of the contraband. A study to determine the typical levels of narcotic material that can be detected from these surfaces has been performed by personnel from Graseby, using a variety of drug materials. The size and packaging of the drug materials has been prepared to try to reflect that typically found in smuggling operations. These tests show that for all hard drugs easily detectable traces of drug material can be found on the vehicle, the proxy and secondary surfaces handled by the proxy. For detection of cannabis, the condition of the original material had a great bearing ont he reliability of detection.
Study on multispectral imaging detection and recognition
NASA Astrophysics Data System (ADS)
Jun, Wang; Na, Ding; Gao, Jiaobo; Yu, Hu; Jun, Wu; Li, Junna; Zheng, Yawei; Fei, Gao; Sun, Kefeng
2009-07-01
Multispectral imaging detecting technology use target radiation character in spectral spatial distribution and relation between spectral and image to detect target and remote sensing measure. Its speciality is multi channel, narrow bandwidth, large amount of information, high accuracy. The ability of detecting target in environment of clutter, camouflage, concealment and beguilement is improved. At present, spectral imaging technology in the range of multispectral and hyperspectral develop greatly. The multispectral imaging equipment of unmanned aerial vehicle can be used in mine detection, information, surveillance and reconnaissance. Spectral imaging spectrometer operating in MWIR and LWIR has already been applied in the field of remote sensing and military in the advanced country. The paper presents the technology of multispectral imaging. It can enhance the reflectance, scatter and radiation character of the artificial targets among nature background. The targets among complex background and camouflage/stealth targets can be effectively identified. The experiment results and the data of spectral imaging is obtained.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vanderwiel, Scott A; Wilson, Alyson G; Graves, Todd L
Both the U. S. Department of Defense (DoD) and Department of Energy (DOE) maintain weapons stockpiles: items like bullets, missiles and bombs that have already been produced and are being stored until needed. Ideally, these stockpiles maintain high reliability over time. To assess reliability, a surveillance program is implemented, where units are periodically removed from the stockpile and tested. The most definitive tests typically destroy the weapons so a given unit is tested only once. Surveillance managers need to decide how many units should be tested, how often they should be tested, what tests should be done, and how themore » resulting data are used to estimate the stockpile's current and future reliability. These issues are particularly critical from a planning perspective: given what has already been observed and our understanding of the mechanisms of stockpile aging, what is an appropriate and cost-effective surveillance program? Surveillance programs are costly, broad, and deep, especially in the DOE, where the US nuclear weapons surveillance program must 'ensure, through various tests, that the reliability of nuclear weapons is maintained' in the absence of full-system testing (General Accounting Office, 1996). The DOE program consists primarily of three types of tests: nonnuclear flight tests, that involve the actual dropping or launching of a weapon from which the nuclear components have been removed; and nonnuclear and nuclear systems laboratory tests, which detect defects due to aging, manufacturing, and design of the nonnuclear and nuclear portions of the weapons. Fully integrated analysis of the suite of nuclear weapons surveillance data is an ongoing area of research (Wilson et al., 2007). This paper introduces a simple model that captures high-level features of stockpile reliability over time and can be used to answer broad policy questions about surveillance programs. Our intention is to provide a framework that generates tractable answers that integrate expert knowledge and high-level summaries of surveillance data to allow decision-making about appropriate trade-offs between the cost of data and the precision of stockpile reliability estimates.« less
Detecting insider activity using enhanced directory virtualization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shin, Dongwan; Claycomb, William R.
2010-07-01
Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between datamore » sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.« less
Authenticating concealed private data while maintaining concealment
Thomas, Edward V [Albuquerque, NM; Draelos, Timothy J [Albuquerque, NM
2007-06-26
A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.
Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients
Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong
2017-01-01
Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356
Concealed renal failure and adverse drug reactions in older patients with type 2 diabetes mellitus.
Corsonello, Andrea; Pedone, Claudio; Corica, Francesco; Mazzei, Bruno; Di Iorio, Angelo; Carbonin, Pierugo; Incalzi, Raffaele Antonelli
2005-09-01
In elderly patients serum creatinine may be normal despite decreased glomerular filtration rate (GFR). The aim of this study was to evaluate the prevalence of this "concealed" renal failure, i.e., renal failure with normal serum creatinine levels, in elderly diabetic patients, and to verify whether it is a risk factor for adverse drug reactions (ADR) to hydrosoluble drugs. We used data on 2257 hospitalized patients with type 2 diabetes mellitus enrolled in the Gruppo Italiano di Farmacovigilanza nell'Anziano study. On the basis of serum creatinine and calculated GFR, patients were grouped as follows: normal renal function (normal serum creatinine levels and normal GFR), concealed (normal serum creatinine levels and reduced GFR), or overt (increased creatinine levels and reduced GFR) renal failure. GFR was calculated using the Modification of Diet in Renal Disease (MDRD) equation. The outcome of the study was the incidence of ADR to hydrosoluble drugs during the hospital stay. The relationship between renal function and ADR was evaluated using Cox regression analysis including potential confounders. Concealed renal failure was observed in 363 (16.1%) of patients studied. Patients with concealed or overt renal failure were older, had more frequently cognitive impairment and polypharmacy, and had lower serum albumin levels than did those with normal renal function. Both concealed (hazard ratio = 1.90; 95% confidence interval, 1.04-3.48; p =.036) and overt (hazard ratio = 2.23; 95% confidence interval, 1.40-3.55; p =.001) renal failure were significantly associated with ADR to hydrosoluble drugs. The use of more than four drugs also qualified as an independent risk factor for ADRs to hydrosoluble drugs during hospital stay. Older diabetic patients should be systematically screened to ascertain the presence of concealed renal failure in an attempt to optimize the pharmacological treatment and reduce the risk of ADRs.
Fluorescent sensors for the detection of chemical warfare agents.
Burnworth, Mark; Rowan, Stuart J; Weder, Christoph
2007-01-01
Along with biological and nuclear threats, chemical warfare agents are some of the most feared weapons of mass destruction. Compared to nuclear weapons they are relatively easy to access and deploy, which makes them in some aspects a greater threat to national and global security. A particularly hazardous class of chemical warfare agents are the nerve agents. Their rapid and severe effects on human health originate in their ability to block the function of acetylcholinesterase, an enzyme that is vital to the central nervous system. This article outlines recent activities regarding the development of molecular sensors that can visualize the presence of nerve agents (and related pesticides) through changes of their fluorescence properties. Three different sensing principles are discussed: enzyme-based sensors, chemically reactive sensors, and supramolecular sensors. Typical examples are presented for each class and different fluorescent sensors for the detection of chemical warfare agents are summarized and compared.
Earth physicist describes US nuclear test monitoring system
NASA Astrophysics Data System (ADS)
1986-01-01
The U. S. capabilities to monitor underground nuclear weapons tests in the USSR was examined. American methods used in monitoring the underground nuclear tests are enumerated. The U. S. technical means of monitoring Solviet nuclear weapons testing, and whether it is possible to conduct tests that could not be detected by these means are examined. The worldwide seismic station network in 55 countries available to the U. S. for seismic detection and measurement of underground nuclear explosions, and also the systems of seismic research observatories in 15 countries and seismic grouping stations in 12 countries are outlined including the advanced computerized data processing capabilities of these facilities. The level of capability of the U. S. seismic system for monitoring nuclear tests, other, nonseismic means of monitoring, such as hydroacoustic and recording of effects in the atmosphere, ionosphere, and the Earth's magnetic field, are discussed.
Psychological and social correlates of HIV status disclosure: the significance of stigma visibility.
Stutterheim, Sarah E; Bos, Arjan E R; Pryor, John B; Brands, Ronald; Liebregts, Maartje; Schaalma, Herman P
2011-08-01
HIV-related stigma, psychological distress, self-esteem, and social support were investigated in a sample comprising people who have concealed their HIV status to all but a selected few (limited disclosers), people who could conceal but chose to be open (full disclosers), and people who had visible symptoms that made concealing difficult (visibly stigmatized). The visibly stigmatized and full disclosers reported significantly more stigma experiences than limited disclosers, but only the visibly stigmatized reported more psychological distress, lower self-esteem, and less social support than limited disclosers. This suggests that having a visible stigma is more detrimental than having a concealable stigma. Differences in psychological distress and self-esteem between the visibly stigmatized and full disclosers were mediated by social support while differences between the visibly stigmatized and limited disclosers were mediated by both social support and stigma. These findings suggest that social support buffers psychological distress in people with HIV.
Powell, James; Reich, Morris; Danby, Gordon
1997-07-22
A magnetic imager 10 includes a generator 18 for practicing a method of applying a background magnetic field over a concealed object, with the object being effective to locally perturb the background field. The imager 10 also includes a sensor 20 for measuring perturbations of the background field to detect the object. In one embodiment, the background field is applied quasi-statically. And, the magnitude or rate of change of the perturbations may be measured for determining location, size, and/or condition of the object.
Mansh, Matthew; White, William; Gee-Tong, Lea; Lunn, Mitchell R; Obedin-Maliver, Juno; Stewart, Leslie; Goldsmith, Elizabeth; Brenman, Stephanie; Tran, Eric; Wells, Maggie; Fetterman, David; Garcia, Gabriel
2015-05-01
To assess identity disclosure among sexual and gender minority (SGM) students pursuing undergraduate medical training in the United States and Canada. From 2009 to 2010, a survey was made available to all medical students enrolled in the 176 MD- and DO-granting medical schools in the United States and Canada. Respondents were asked about their sexual and gender identity, whether they were "out" (i.e., had publicly disclosed their identity), and, if they were not, their reasons for concealing their identity. The authors used a mixed-methods approach and analyzed quantitative and qualitative survey data. Of 5,812 completed responses (of 101,473 eligible respondents; response rate 5.7%), 920 (15.8%) students from 152 (of 176; 86.4%) institutions identified as SGMs. Of the 912 sexual minorities, 269 (29.5%) concealed their sexual identity in medical school. Factors associated with sexual identity concealment included sexual minority identity other than lesbian or gay, male gender, East Asian race, and medical school enrollment in the South or Central regions of North America. The most common reasons for concealing one's sexual identity were "nobody's business" (165/269; 61.3%), fear of discrimination in medical school (117/269; 43.5%), and social or cultural norms (110/269; 40.9%). Of the 35 gender minorities, 21 (60.0%) concealed their gender identity, citing fear of discrimination in medical school (9/21; 42.9%) and lack of support (9/21; 42.9%). SGM students continue to conceal their identity during undergraduate medical training. Medical institutions should adopt targeted policies and programs to better support these individuals.
Invited Review Article: Current State of Research on Biological Effects of Terahertz Radiation
NASA Astrophysics Data System (ADS)
Wilmink, Gerald J.; Grundt, Jessica E.
2011-10-01
Terahertz (THz) imaging and sensing technologies are increasingly being used in a host of medical, military, and security applications. For example, THz systems are now being tested at international airports for security screening purposes, at major medical centers for cancer and burn diagnosis, and at border patrol checkpoints for identification of concealed explosives, drugs, and weapons. Recent advances in THz applications have stimulated renewed interest regarding the biological effects associated with this frequency range. Biological effects studies are a valuable type of basic science research because they serve to enhance our fundamental understanding of the mechanisms that govern THz interactions with biological systems. Such studies are also important because they often times lay the foundation for the development of future applications. In addition, from a practical standpoint, THz biological effects research is also necessary for accurate health hazard evaluation, the development of empirically-based safety standards, and for the safe use of THz systems. Given the importance and timeliness of THz bioeffects data, the purpose of this review is twofold. First, to provide readers with a common reference, which contains the necessary background concepts in biophysics and THz technology, that are required to both conduct and evaluate THz biological research. Second, to provide a critical review of the scientific literature.
NASA Astrophysics Data System (ADS)
Wang, Long-tao; Jiang, Ning; Lv, Ming-shan
2015-10-01
With the emergence of the anti-ship missle with the capability of infrared imaging guidance, the traditional single jamming measures, because of the jamming mechanism and technical flaws or unsuitable use, greatly reduced the survival probability of the war-ship in the future naval battle. Intergrated jamming of IR weakening + smoke-screen Can not only make jamming to the search and tracking of IR imaging guidance system , but also has feasibility in conjunction, besides , which also make the best jamming effect. The research conclusion has important realistic meaning for raising the antimissile ability of surface ships. With the development of guidance technology, infrared guidance system has expanded by ir point-source homing guidance to infrared imaging guidance, Infrared imaging guidance has made breakthrough progress, Infrared imaging guidance system can use two-dimensional infrared image information of the target, achieve the precise tracking. Which has Higher guidance precision, better concealment, stronger anti-interference ability and could Target the key parts. The traditional single infrared smoke screen jamming or infrared decoy flare interference cannot be imposed effective interference. So, Research how to effectively fight against infrared imaging guided weapons threat measures and means, improving the surface ship antimissile ability is an urgent need to solve.
Recommended Immunological Assays to Screen for Ricin-Containing Samples
Simon, Stéphanie; Worbs, Sylvia; Avondet, Marc-André; Tracz, Dobryan M.; Dano, Julie; Schmidt, Lisa; Volland, Hervé; Dorner, Brigitte G.; Corbett, Cindi R.
2015-01-01
Ricin, a toxin from the plant Ricinus communis, is one of the most toxic biological agents known. Due to its availability, toxicity, ease of production and absence of curative treatments, ricin has been classified by the Centers for Disease Control and Prevention (CDC) as category B biological weapon and it is scheduled as a List 1 compound in the Chemical Weapons Convention. An international proficiency test (PT) was conducted to evaluate detection and quantification capabilities of 17 expert laboratories. In this exercise one goal was to analyse the laboratories’ capacity to detect and differentiate ricin and the less toxic, but highly homologuous protein R. communis agglutinin (RCA120). Six analytical strategies are presented in this paper based on immunological assays (four immunoenzymatic assays and two immunochromatographic tests). Using these immunological methods “dangerous” samples containing ricin and/or RCA120 were successfully identified. Based on different antibodies used the detection and quantification of ricin and RCA120 was successful. The ricin PT highlighted the performance of different immunological approaches that are exemplarily recommended for highly sensitive and precise quantification of ricin. PMID:26703725
Recommended Immunological Assays to Screen for Ricin-Containing Samples.
Simon, Stéphanie; Worbs, Sylvia; Avondet, Marc-André; Tracz, Dobryan M; Dano, Julie; Schmidt, Lisa; Volland, Hervé; Dorner, Brigitte G; Corbett, Cindi R
2015-11-26
Ricin, a toxin from the plant Ricinus communis, is one of the most toxic biological agents known. Due to its availability, toxicity, ease of production and absence of curative treatments, ricin has been classified by the Centers for Disease Control and Prevention (CDC) as category B biological weapon and it is scheduled as a List 1 compound in the Chemical Weapons Convention. An international proficiency test (PT) was conducted to evaluate detection and quantification capabilities of 17 expert laboratories. In this exercise one goal was to analyse the laboratories' capacity to detect and differentiate ricin and the less toxic, but highly homologuous protein R. communis agglutinin (RCA120). Six analytical strategies are presented in this paper based on immunological assays (four immunoenzymatic assays and two immunochromatographic tests). Using these immunological methods "dangerous" samples containing ricin and/or RCA120 were successfully identified. Based on different antibodies used the detection and quantification of ricin and RCA120 was successful. The ricin PT highlighted the performance of different immunological approaches that are exemplarily recommended for highly sensitive and precise quantification of ricin.
20 CFR 404.502 - Overpayments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... representative payee for payments made after the beneficiary's death. We will not recover such overpayments from... intentional false statement or representation, or willful concealment of, or deliberate failure to furnish... individual's intentional false statement or representation, or willful concealment of, or deliberate failure...
NASA Astrophysics Data System (ADS)
Zurk, L. M.; Schecklman, S.
Terahertz (THz) Time Domain Spectroscopy (TDS) measurements have the unique ability to detect both the amplitude and phase of the electric field, simultaneously. This eliminates complications introduced by Kramers-Kronig relations typically used in near-infrared spectroscopy. Many materials of interest contain resonant features in their refractive indices in the far-infrared (THz) spectrum, while their packaging materials are generally transparent. Thus, an important application for THz TDS is the ability to see inside packaging materials and detect the material features of their contents. Such applications are promising for security screening (concealed drugs, explosives, etc.) in post offices and airports as well as for non-destructive evaluation (NDE) of products on an assembly line or tissue damage due to burns or cancer [1-6].
Management of concealed penis with modified penoplasty.
Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu
2015-03-01
To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.
Modified penoplasty for concealed penis in children.
Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan
2013-09-01
To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.
Hiding and finding: the relationship between visual concealment and visual search.
Smilek, Daniel; Weinheimer, Laura; Kwan, Donna; Reynolds, Mike; Kingstone, Alan
2009-11-01
As an initial step toward developing a theory of visual concealment, we assessed whether people would use factors known to influence visual search difficulty when the degree of concealment of objects among distractors was varied. In Experiment 1, participants arranged search objects (shapes, emotional faces, and graphemes) to create displays in which the targets were in plain sight but were either easy or hard to find. Analyses of easy and hard displays created during Experiment 1 revealed that the participants reliably used factors known to influence search difficulty (e.g., eccentricity, target-distractor similarity, presence/absence of a feature) to vary the difficulty of search across displays. In Experiment 2, a new participant group searched for the targets in the displays created by the participants in Experiment 1. Results indicated that search was more difficult in the hard than in the easy condition. In Experiments 3 and 4, participants used presence versus absence of a feature to vary search difficulty with several novel stimulus sets. Taken together, the results reveal a close link between the factors that govern concealment and the factors known to influence search difficulty, suggesting that a visual search theory can be extended to form the basis of a theory of visual concealment.
Lyons, Anthony; Pepping, Christopher A
2017-09-01
Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.
Further evidence for GHB naturally occurring in common non-alcoholic beverages.
Elliott, Simon P; Fais, Paolo
2017-08-01
GHB has been implicated in many cases of suspected surreptitious administration with the purpose of increasing victim vulnerability to sexual assault. Low amounts of endogenous (or naturally occurring) GHB, which do not reach pharmacologically active levels, have been detected in alcoholic and non-alcoholic beverages. Due to the continued requirement to obtain data on the presence of endogenous GHB in various beverage types, GHB concentrations were measured in a series of non-alcoholic beverages. Tonic water and lemon flavoured tonic water beverages were analysed at 0, 24 and 96h after the bottle opening using gas chromatography coupled to tandem mass spectrometry (GC-MS/MS) on an Agilent 6890/7000C Triple Quadrupole. GHB was detected in all beverages at very low amounts ranging from 89 to 145ng/mL (0.089-0.145mg/L) and did not demonstrate a general trend of variation for concentration along the tested time span (96h). The presented data provide additional evidence for the endogenous nature of GHB in non-alcoholic beverages at very low concentrations, which are many orders of magnitude lower than those described to produce any pharmacological effect on the subject. However, when considering a case of alleged drug-facilitated sexual assault, a low level of GHB detected in a drink may be related both to a surreptitiously GHB administration with subsequent dilution for concealment or to the presence of endogenous GHB. On this basis, a comprehensive analysis of all the available information, including circumstantial data demonstrating possible attempts to conceal GHB administration and an assessment of levels of endogenous GHB in the suspected beverage type, is of the utmost importance for a proper interpretation of the toxicological results. Copyright © 2017 Elsevier B.V. All rights reserved.
Decoration Increases the Conspicuousness of Raptor Nests
Canal, David; Mulero-Pázmány, Margarita; Negro, Juan José; Sergio, Fabrizio
2016-01-01
Avian nests are frequently concealed or camouflaged, but a number of species builds noticeable nests or use conspicuous materials for nest decoration. In most cases, nest decoration has a role in mate choice or provides thermoregulatory or antiparasitic benefits. In territorial species however, decorations may serve additional or complementary functions, such as extended phenotypic signaling of nest-site occupancy and social status to potential intruders. The latter may benefit both signaler and receiver by minimizing the risk of aggressive interactions, especially in organisms with dangerous weaponry. Support for this hypothesis was recently found in a population of black kites (Milvus migrans), a territorial raptor that decorates its nest with white artificial materials. However, the crucial assumption that nest decorations increased nest-site visibility to conspecifics was not assessed, a key aspect given that black kite nests may be well concealed within the canopy. Here, we used an unmanned aircraft system to take pictures of black kite nests, with and without an experimentally placed decoration, from different altitudes and distances simulating the perspective of a flying and approaching, prospecting intruder. The pictures were shown to human volunteers through a standardized routine to determine whether detection rates varied according the nest decoration status and distance. Decorated nests consistently showed a higher detection frequency and a lower detection-latency, compared to undecorated versions of the same nests. Our results confirm that nest decoration in this species may act as a signaling medium that enhances nest visibility for aerial receivers, even at large distances. This finding complements previous work on this communication system, which showed that nest decoration was a threat informing trespassing conspecifics on the social dominance, territory quality and fighting capabilities of the signaler. PMID:27455066
Decoration Increases the Conspicuousness of Raptor Nests.
Canal, David; Mulero-Pázmány, Margarita; Negro, Juan José; Sergio, Fabrizio
2016-01-01
Avian nests are frequently concealed or camouflaged, but a number of species builds noticeable nests or use conspicuous materials for nest decoration. In most cases, nest decoration has a role in mate choice or provides thermoregulatory or antiparasitic benefits. In territorial species however, decorations may serve additional or complementary functions, such as extended phenotypic signaling of nest-site occupancy and social status to potential intruders. The latter may benefit both signaler and receiver by minimizing the risk of aggressive interactions, especially in organisms with dangerous weaponry. Support for this hypothesis was recently found in a population of black kites (Milvus migrans), a territorial raptor that decorates its nest with white artificial materials. However, the crucial assumption that nest decorations increased nest-site visibility to conspecifics was not assessed, a key aspect given that black kite nests may be well concealed within the canopy. Here, we used an unmanned aircraft system to take pictures of black kite nests, with and without an experimentally placed decoration, from different altitudes and distances simulating the perspective of a flying and approaching, prospecting intruder. The pictures were shown to human volunteers through a standardized routine to determine whether detection rates varied according the nest decoration status and distance. Decorated nests consistently showed a higher detection frequency and a lower detection-latency, compared to undecorated versions of the same nests. Our results confirm that nest decoration in this species may act as a signaling medium that enhances nest visibility for aerial receivers, even at large distances. This finding complements previous work on this communication system, which showed that nest decoration was a threat informing trespassing conspecifics on the social dominance, territory quality and fighting capabilities of the signaler.
Concealed semantic and episodic autobiographical memory electrified.
Ganis, Giorgio; Schendan, Haline E
2012-01-01
Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.
Concealed semantic and episodic autobiographical memory electrified
Ganis, Giorgio; Schendan, Haline E.
2013-01-01
Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816
Geven, Linda M; Ben-Shakhar, Gershon; Kindt, Merel; Verschuere, Bruno
2018-06-15
From a cognitive perspective, lying can be regarded as a complex cognitive process requiring the interplay of several executive functions. Meta-analytic research on 114 studies encompassing 3,307 participants (Suchotzki, Verschuere, Van Bockstaele, Ben-Shakhar, & Crombez, ) suggests that computerized paradigms can reliably assess the cognitive burden of lying, with large reaction time differences between lying and truth telling. These studies, however, lack a key ingredient of real-life deception, namely self-initiated behavior. Research participants have typically been instructed to commit a mock crime and conceal critical information, whereas in real life, people freely choose whether or not to engage in antisocial behavior. In this study, participants (n = 433) engaged in a trivia quiz and were provided with a monetary incentive for high accuracy performance. Participants were randomly allocated to either a condition where they were instructed to cheat on the quiz (mimicking the typical laboratory set-up) or to a condition in which they were provided with the opportunity to cheat, yet without explicit instructions to do so. Assessments of their response times in a subsequent Concealed Information Test (CIT) revealed that both instructed cheaters (n = 107) and self-initiated cheaters (n = 142) showed the expected RT-slowing for concealed information. The data indicate that the cognitive signature of lying is not restricted to explicitly instructed cheating, but it can also be observed for self-initiated cheating. These findings are highly encouraging from an ecological validity perspective. Copyright © 2018 The Authors. Topics in Cognitive Science published by Wiley Periodicals, Inc. on behalf of Cognitive Science Society. Inc.
An investigation into regular recruit wastage from the British Army, 1988.
Jefferson, T O
1990-10-01
A study was made of recruit medical discharges in the British Army in 1988 with the aim of ascertaining the number of medical discharges amongst recruits. AFBs 6863 (Notification of Discharge of a Regular Recruit) were used as the source of data. Recruit medical wastage rate for 1988 was 897 cases, or 16.7% of all known discharges. Three types of medical discharges were present. Four hundred and ninety-six Type 1 or concealed discharges, (9.2% of discharges for all reasons) were made up of cases who had not been boarded and had mainly been discharged under QR 9.381 (defect of enlistment). Two hundred and seventy-five Type 2 discharges (5.1% of discharges for all reasons) represented boarded cases discharged under QR 9.385 (ceasing to fulfil medical requirements). One hundred and twenty-six Type 3 discharges (2.3% of all discharges) were boarded cases mainly discharged under QR 9.381 (defect of enlistment). As all discharges under paragraphs other than QR 9.385 are given administrative discharge outflow code, only the 275 Type 2 discharges (or 31.7% of medical discharges) appeared on the Army's own source of medical data, the TRIMEDS database. This had the effect of concealing the majority of those discharges caused by conditions predating enlistment therefore decreasing the number of known false negatives not detected at recruiting medicals. The biggest causes of discharge were conditions of the lower limbs and back (54.5% of medical discharges), a conglomerate of minor categories of pathology (14.6%), asthma (9.6%) and deformities (7.4%). Within each type the bulk of the discharges was concealed in Type 1 discharges especially for conditions predating enlistment.(ABSTRACT TRUNCATED AT 250 WORDS)
NASA Astrophysics Data System (ADS)
Solodov, Alexander
The proliferation of nuclear weapons is a great threat to world peace and stability. The question of strengthening the nonproliferation regime has been open for a long period of time. In 1997 the International Atomic Energy Agency (IAEA) Board of Governors (BOG) adopted the Additional Safeguards Protocol. The purpose of the protocol is to enhance the IAEA's ability to detect undeclared production of fissile materials in member states. However, the IAEA does not always have sufficient human and financial resources to accomplish this task. Developed here is a concept for making use of human and technical resources available in academia that could be used to enhance the IAEA's mission. The objective of this research was to study the feasibility of an academic community using commercially or publicly available sources of information and products for the purpose of detecting covert facilities and activities intended for the unlawful acquisition of fissile materials or production of nuclear weapons. In this study, the availability and use of commercial satellite imagery systems, commercial computer codes for satellite imagery analysis, Comprehensive Test Ban Treaty (CTBT) verification International Monitoring System (IMS), publicly available information sources such as watchdog groups and press reports, and Customs Services information were explored. A system for integrating these data sources to form conclusions was also developed. The results proved that publicly and commercially available sources of information and data analysis can be a powerful tool in tracking violations in the international nuclear nonproliferation regime and a framework for implementing these tools in academic community was developed. As a result of this study a formation of an International Nonproliferation Monitoring Academic Community (INMAC) is proposed. This would be an independent organization consisting of academics (faculty, staff and students) from both nuclear weapon states (NWS) and non-nuclear weapon states (NNWS). This community analyzes all types of unclassified publicly and commercially available information to aid in detection of violations of the non-proliferation regime. INMAC shares all of this information with the IAEA and the public. Since INMAC is composed solely by members of the academic community, this organization would not demonstrate any biases in its investigations or reporting.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smithson, A.E.
On July 15, the United States, supported by Britain, Australia, and Japan, proposed a new challenge inspection plan for the chemical weapons convention (CWC), which will prohibit the production, possession, use, and transfer of chemical weapons. The Bush administration claims this proposal has the same anytime, anywhere, with no right of refusal' challenge-inspection features George Bush first recommended in 1984 - as well as the latest in managed access,' aerial inspection, and use of sensing devices. But the proposal would let a challenged country stall for days without allowing inspectors to glimpse a suspected chemical-weapons site, and inspectors might nevermore » be able to step inside the gates of facilities where cheating is suspected. Countries considering joining the CWC must realize that the new US approach involves plenty of talk but little action. In fact, the US challenge-inspection plan falls so far short of the means needed to detect and deter prohibited activities that even Saddam Hussein and Muammar Khadafi may queue up to sign on the dotted line.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ember, L.R.
The air-power-dominated Persian Gulf War was the largest massing of coalition forces since World War II. This short conflict left its own intriguing legacy of unanswered questions. Were chemical weapons used in the theater of war Some US Allies, many US service members, and a US Senator believe they were. Yet both US and U.K. defense establishments offer emphatic denials. If Saddam Hussein didn't use chemical weapons, how can the multitude of warning alarms that sounded, alarms indicating the presence of these warfare agents, be explained Did the chemical warfare (CW) agent monitors and detectors the US deployed operate properlymore » And were they sensitive enough to detect not just militarily significant levels, for which troops would have had to don full protective gear, but also very low concentrations of these weapons, levels that Sen. Richard C. Shelby (D.-Ala.) believes may be responsible for the illnesses many Gulf War veterans are now experiencing In this paper, the author addressed these questions.« less
George, Mathew Sunil; Lambert, Helen
2015-01-01
In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives.
George, Mathew Sunil; Lambert, Helen
2015-01-01
In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959
Long, Ashley S; Ambegaonkar, Jatin P; Fahringer, Patty M
2011-12-01
The performing arts style of cirque has grown in popularity, with high-school participants increasingly practicing this style. Still, little research has examined the injury reporting rates and patterns in this population. Our study aimed to compare injury reporting rates and injury concealment patterns between high-school cirque performers and a peer-group of basketball players. Fifty participants (30 cirque, 20 basketball) completed a 12-item injury history and concealment instrument with chi-squared analyses and Fisher's exact tests comparing groups (p = 0.05). While no group differences (p = 0.36) existed in injuries reported, basketball players were more likely (p = 0.01) to miss participation due to injury than cirque performers. No significant difference existed between participants regarding which healthcare provider they reported to first (p = 0.27), but basketball players reported their injuries to the athletic trainer at higher rates (50%) than cirque performers (20%). A nonsignificant trend (p = 0.08) was noted in promptness to report injury, with more cirque performers (13%) concealing their injuries than basketball players (5%). Several reasons were noted for concealment of injury, with the most common being the belief that the injury would "go away" on its own. Knee injuries were most common in basketball players (23.7%) and back and knee injuries (10.5% each) in cirque performers. Despite similar injury rates, cirque participants concealed injuries more than peer-basketball players. Reasons may include losing performance roles, unfamiliarity and low trust with healthcare providers, ignorance about initially minor-looking injuries, and higher pain tolerance thresholds. Education and communication are essential to allow performing artists to seek healthcare support. Research is needed to appropriately understand and meet the needs of this underserved performing artist population.
The need for randomization in animal trials: an overview of systematic reviews.
Hirst, Jennifer A; Howick, Jeremy; Aronson, Jeffrey K; Roberts, Nia; Perera, Rafael; Koshiaris, Constantinos; Heneghan, Carl
2014-01-01
Randomization, allocation concealment, and blind outcome assessment have been shown to reduce bias in human studies. Authors from the Collaborative Approach to Meta Analysis and Review of Animal Data from Experimental Studies (CAMARADES) collaboration recently found that these features protect against bias in animal stroke studies. We extended the scope the work from CAMARADES to include investigations of treatments for any condition. We conducted an overview of systematic reviews. We searched Medline and Embase for systematic reviews of animal studies testing any intervention (against any control) and we included any disease area and outcome. We included reviews comparing randomized versus not randomized (but otherwise controlled), concealed versus unconcealed treatment allocation, or blinded versus unblinded outcome assessment. Thirty-one systematic reviews met our inclusion criteria: 20 investigated treatments for experimental stroke, 4 reviews investigated treatments for spinal cord diseases, while 1 review each investigated treatments for bone cancer, intracerebral hemorrhage, glioma, multiple sclerosis, Parkinson's disease, and treatments used in emergency medicine. In our sample 29% of studies reported randomization, 15% of studies reported allocation concealment, and 35% of studies reported blinded outcome assessment. We pooled the results in a meta-analysis, and in our primary analysis found that failure to randomize significantly increased effect sizes, whereas allocation concealment and blinding did not. In our secondary analyses we found that randomization, allocation concealment, and blinding reduced effect sizes, especially where outcomes were subjective. Our study demonstrates the need for randomization, allocation concealment, and blind outcome assessment in animal research across a wide range of outcomes and disease areas. Since human studies are often justified based on results from animal studies, our results suggest that unduly biased animal studies should not be allowed to constitute part of the rationale for human trials.
NASA Astrophysics Data System (ADS)
Fish, Janet D.
2014-05-01
Man has used poisons for assassination purposes ever since the dawn of civilization, not only against individual enemies but also occasionally against armies. According to (Frischknecht, 2003)11 article on the History of Biological Warfare, during the past century, more than 500 million people died of infectious diseases. Several tens of thousands of these deaths were due to the deliberate release of pathogens or toxins. Two international treaties outlawed biological weapons in 1925 and 1972, but they have largely failed to stop countries from conducting offensive weapons research and large-scale production of biological weapons. Before the 20th century, biological warfare took on three main forms: (1) deliberate poisoning of food and water with infectious material, (2) use of microorganisms or toxins in some form of weapon system, and (3) use of biologically inoculated fabrics (Dire, 2013)8. This action plan is aimed at the recognition of the lack of current processes in place under an unidentified lead agency to detect, identify, track, and contain biological agents that can enter into the United States through a human host. This action plan program has been identified as the Consumer of Concern Early Entry Program or a simpler title is C-CEEP.
Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty
NASA Astrophysics Data System (ADS)
Garwin, Richard L.
2003-04-01
The National Academy of Sciences recently published a detailed study of technical factors related to the Comprehensive Nuclear Test Ban Treaty (CTBT), with emphasis on those issues that arose when the Senate declined to ratify the Treaty in 1999. The study considered (1) the capacity of the United States to maintain confidence in the safety and reliability of its nuclear weapons without nuclear testing; (2) the capabilities of the international nuclear-test monitoring system; and (3) the advances in nuclear weapons capabilities that other countries might make through low-yield testing that might escape detection. Excluding political factors, the committee considered three possible future worlds: (1) a world without a CTBT; (2) a world in which the signatories comply with a CTBT; and (3) a world in the signatories evade its strictures within the limits set by the detection system. The talk and ensuing discussion will elaborate on the study. The principal conclusion of the report, based solely on technical reasons, is that the national security of the United States is better served with a CTBT in force than without it, whether or not other signatories conduct low level but undetected tests in violation of the treaty. Moreover, the study finds that nuclear testing would not add substantially to the US Stockpile Stewardship Program in allowing the United States to maintain confidence in the assessment of its existing nuclear weapons.
Technical Issues Related to the Comprehensive Nuclear Test Ban Treaty
NASA Astrophysics Data System (ADS)
2003-03-01
The National Academy of Sciences recently completed a detailed study of the technical factors related to the Comprehensive Nuclear Test Ban Treaty (CTBT), with emphasis on those issues that arose when the Senate declined to ratify the Treaty in 1999. The study considered (1) the capacity of the United States to maintain confidence in the safety and reliability of its nuclear weapons without nuclear testing; (2) the capabilities of the international nuclear-test monitoring system; and (3) the advances in nuclear weapons capabilities that other countries might make through low-yield testing that might escape detection. While political factors were excluded, the committee considered three possible future worlds: (1) a world without a CTBT; (2) a world in which the signatories comply with a CTBT; and (3) a world in the signatories evade its strictures within the limits set by the detection system. The talk will elaborate on the study. The primary conclusion, based solely on technical reasons, is that the national security of the United States is better served with a CTBT in force than without it, whether or not other signatories conduct low level but undetected tests in violation of the treaty. Moreover, the study finds that nuclear testing would not add substantially to the US Stockpile Stewardship Program in allowing the United States to maintain confidence in the assessment of its existing nuclear weapons."
The inconspicuous penis in children.
Cimador, Marcello; Catalano, Pieralba; Ortolano, Rita; Giuffrè, Mario
2015-04-01
The term 'inconspicuous penis' refers to a group of anatomical abnormalities in which the penis looks smaller than is expected. Micropenis can be defined as 'true micropenis'--which results from a defect in the hypothalamic-pituitary-gonadal axis--and 'micropenis secondary to congenital anatomical anomalies of the surrounding and overlying structures'--also known as 'concealed penis'. The different forms of concealed penis include webbed penis, congenital megaprepuce and partially hidden penis caused by prepubic adiposity. This disorder can also have iatrogenic causes resulting from adhesions that are secondary to circumcision--this type of concealed penis is known as 'trapped penis'. However, in both groups, micropenis is defined as a stretched penile length that is at least 2.5 SD below the mean for the patient's age, but without any other penile defects. Patients with true micropenis can be managed with testosterone, which has demonstrated good penile elongation results in the long term. Surgery also has a pivotal role in reconstruction for elongating the penis and for correction of anatomical abnormalities in concealed penis.
Asha, Stephen Edward; Higham, Matthew; Child, Peter
2015-05-01
If package counts on abdominal CTs of body-packers were known to be accurate, follow-up CTs could be avoided. The objective was to determine the accuracy of CT for the number of concealed packages in body-packers, and the reliability of package counts reported by body-packers who admit to concealing drugs. Suspected body-packers were identified from the emergency departments (ED) database. The medical record and radiology reports were reviewed for package counts determined by CT, patient-reported and physically retrieved. The last method was used as the reference standard. Sensitivity, specificity, positive predictive values (PPV) and negative predictive values (NPV) were calculated for CT package count accuracy. Reliability of patient-reported package counts was assessed using Pearson's correlation coefficient. There were 50 confirmed body-packers on whom 104 CT scans were performed. Data for the index and reference tests were available for 84 scans. The sensitivity, specificity, PPV and NPV for CT package count were 63% (95% CI 46% to 77%), 82% (95% CI 67% to 92%), 76% (95% CI 58% to 89%) and 71% (95% CI 56% to 83%) respectively. For CTs with a package count<15, the sensitivity, specificity, PPV and NPV for CT package count were 96% (95% CI 80% to 99%), 95% (95% CI 82% to 99%), 93% (95% CI 76% to 99%) and 97% (95% CI 86% to 100%), respectively. Correlation between patient-reported package counts and the number of packages retrieved was high (r=0.90, p<0.001, R2=81%). The accuracy of CT for determining the number of concealed packages is poor, although when applied to patients with few concealed packages accuracy is high and is useful as a rule-out test. Among patients who have admitted to drug concealment, the number of packages reported to be concealed is reliable. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
The "double life" of bulimia: patients' experiences in daily life interactions.
Pettersen, Gunn; Rosenvinge, Jan H; Ytterhus, Borgunn
2008-01-01
This qualitative study, using interviews with 38 subjects, explored how and why they conceal bulimic symptoms and the understanding of concealing in terms of social interaction. A "double life" was described as a dichotomy between being active and outgoing versus performing shameful bulimic behaviors and constantly living with fear of stigmatization, and striving against exposure. Concealing was well planned to avoid such fear, and to preserve dignity. Bulimia may be understood as volitional exertion of interaction control, not just as a result of poor impulse regulation. Understanding the meaning of secrecy and "double life" may facilitate help seeking behavior and guide treatment.
Sampson, Jay A.; Rodriguez, Brian D.
2010-01-01
The Sunnyside porphyry copper system is part of the concealed San Rafael Valley porphyry system located in the Patagonia Mountains of Arizona. The U.S. Geological Survey is conducting a series of multidisciplinary studies as part of the Assessment Techniques for Concealed Mineral Resources project. To help characterize the size, resistivity, and skin depth of the polarizable mineral deposit concealed beneath thick overburden, a regional east-west audio-magnetotelluric sounding profile was acquired. The purpose of this report is to release the audio-magnetotelluric sounding data collected along that east-west profile. No interpretation of the data is included.
Defense Threat Reduction Agency
Sciences Protection Sciences Science to Defeat WMD Science to Secure WMD Chemical/Biological Technologies of Chemical, Biological, Radiological and Nuclear instruction. Watch Read DTRA leadership meet with How Butterflies Can Detect Deadly Chemical Weapon Agents May 2 Changing World Situation Requires
Purification Efficacy of Synthetic Cannabinoid Conjugates Using High-Pressure Liquid Chromatography
In the current study, we successfully purified several synthetic cannabinoid (SC):dark quencher conjugates essential for the success of the synthetic... cannabinoid detection platform developed at the US Army Research Laboratorys Weapons and Materials Research Directorate. The purification was
Prospects for improved detection of chemical, biological, radiological, and nuclear threats
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wuest, Craig R.; Hart, Brad; Slezak, Thomas R.
2012-07-31
Acquisition and use of Chemical, Biological, Radiological, and Nuclear (CBRN) weapons continue to be a major focus of concern form the security apparatus of nation states because of their potential for mass casualties when used by a determined adversary.
Defense Advanced Research Projects Agency: Strategic Plan
2009-05-01
technologies to detect, prevent, or mitigate asymmetric attacks, including suicide bombers, improvised explosive devices, and weapons of mass destruction...the Army’s Command Post of the Future (CPOF) to amplify the capabilities of overworked combat command and control staffs. Working with CPOF, PAL
College Students' Reasons for Concealing Suicidal Ideation
ERIC Educational Resources Information Center
Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow
2012-01-01
Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…
Behavioral Indicators of Legal and Illegal Gun Carrying
2015-05-01
wide variety of handguns , in a wide variety of sizes and shapes, made of a wide variety of materials , and this variation is likely to have a subtle...Under Clothing/Belt ..................................................................................................... 23 Concealment of Handgun ...in Center of Chest ..................................................................................... 24 Concealment of Handgun in Groin Area with
Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.
Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G
2016-01-01
Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.
Thirlaway, H. I. S.
1979-01-01
Twenty years ago, politicians, concerned a the slow progress of negotiations to stop nuclear weapons testing, described the state of seismology as being in the equivalent of the Stone Age. this assessment spurred the beginning of research and development at the Atomic Weapons Research Establishment near the village of Aldermaston, England. the object was to establish the limits of seismology for the detection and identification of underground explosions against a background of earthquakes. Thereby, verification that there was compliance with a treaty to ban further nuclear tests could be assessed before making political decisions. Negotiations now taking place in Geneva between the Soviet Union, the United States, and the United Kingdom are aimed at such a treaty.
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
ERIC Educational Resources Information Center
Laird, Robert D.; Marrero, Matthew D.; Melching, Jessica A.; Kuhn, Emily S.
2013-01-01
Adolescents use various strategies to manage their parents' access to information. This study tested developmental change in strategy use, longitudinal associations between disclosing and concealing strategies, and longitudinal associations linking disclosing and concealing strategies with antisocial behavior and depressive symptoms. Self-report…
The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept
ERIC Educational Resources Information Center
Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling
2011-01-01
Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…
Concealed Questions. In Search of Answers
ERIC Educational Resources Information Center
Frana, Ilaria
2010-01-01
This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…
Ground roost resource selection for Merriam's wild turkeys
Chad P. Lehman; Daniel J. Thompson; Mark A. Rumble
2010-01-01
Concealment cover is important for ground-roosting wild turkey (Meleagris gallopavo) poults immediately following hatch during the vulnerable, preflight stage. We compared concealment cover resources selected at ground roosts to those of nest sites and available resources for Merriam's turkeys (Meleagris gallopavo merriami) in the Black Hills of South Dakota, USA...
Detection of Nuclear Weapons and Materials: Science, Technologies, Observations
2009-08-04
use of photons, packets of energy with no rest mass and no electrical charge. Electromagnetic radiation consists of photons, and may be measured as...density is a bulk property, expressed as mass per unit volume. In general, the densest materials are those of high Z. These properties may be used...generally dictate detection threshold settings through their impact on innocent alarm rates. Characterization of these factors is critical to
Characterizing noise in the global nuclear weapon monitoring system
NASA Astrophysics Data System (ADS)
Schultz, Colin
2013-03-01
Under the auspices of the Comprehensive Nuclear-Test-Ban Treaty Organization, a worldwide monitoring system designed to detect the illegal testing of nuclear weaponry has been under construction since 1999. The International Monitoring System is composed of a range of sensors, including detectors for hydroacoustic and seismic signals, and when completed, will include 60 infrasound measurement arrays set to detect low-frequency sound waves produced by an atmospheric nuclear detonation.
A definitional framework for the human/biometric sensor interaction model
NASA Astrophysics Data System (ADS)
Elliott, Stephen J.; Kukula, Eric P.
2010-04-01
Existing definitions for biometric testing and evaluation do not fully explain errors in a biometric system. This paper provides a definitional framework for the Human Biometric-Sensor Interaction (HBSI) model. This paper proposes six new definitions based around two classifications of presentations, erroneous and correct. The new terms are: defective interaction (DI), concealed interaction (CI), false interaction (FI), failure to detect (FTD), failure to extract (FTX), and successfully acquired samples (SAS). As with all definitions, the new terms require a modification to the general biometric model developed by Mansfield and Wayman [1].
NASA Astrophysics Data System (ADS)
Warren, John L.; Vadnais, Kenneth G.
1997-01-01
Recent advances in miniature photomultiplier tubes and low power electronics have made possible a new generation of small gamma-ray radiation detectors specifically designed for use by government and law enforcement agencies for the detection and interdiction of concealed nuclear materials. This paper describes an inexpensive pager sized radiation detector that can be worn on the belt or carried in a pocket for hands free operation, and which can quietly alert the operator to the presence of nuclear material. The sensitivity performance of the detector technology and the application of the instrument to law enforcement and nuclear smuggling are discussed.
Garg, Prabhat; Purohit, Ajay; Tak, Vijay K; Dubey, D K
2009-11-06
N,N-Dialkylamino alcohols, N-methyldiethanolamine, N-ethyldiethanolamine and triethanolamine are the precursors of VX type nerve agents and three different nitrogen mustards respectively. Their detection and identification is of paramount importance for verification analysis of chemical weapons convention. GC-FTIR is used as complimentary technique to GC-MS analysis for identification of these analytes. One constraint of GC-FTIR, its low sensitivity, was overcome by converting the analytes to their fluorinated derivatives. Owing to high absorptivity in IR region, these derivatives facilitated their detection by GC-FTIR analysis. Derivatizing reagents having trimethylsilyl, trifluoroacyl and heptafluorobutyryl groups on imidazole moiety were screened. Derivatives formed there were analyzed by GC-FTIR quantitatively. Of these reagents studied, heptafluorobutyrylimidazole (HFBI) produced the greatest increase in sensitivity by GC-FTIR detection. 60-125 folds of sensitivity enhancement were observed for the analytes by HFBI derivatization. Absorbance due to various functional groups responsible for enhanced sensitivity were compared by determining their corresponding relative molar extinction coefficients ( [Formula: see text] ) considering uniform optical path length. The RSDs for intraday repeatability and interday reproducibility for various derivatives were 0.2-1.1% and 0.3-1.8%. Limit of detection (LOD) was achieved up to 10-15ng and applicability of the method was tested with unknown samples obtained in international proficiency tests.
Apparatus and methods for real-time detection of explosives devices
Blackburn, Brandon W [Idaho Falls, ID; Hunt, Alan W [Pocatello, ID; Chichester, David L [Idaho Falls, ID
2014-01-07
The present disclosure relates, according to some embodiments, to apparatus, devices, systems, and/or methods for real-time detection of a concealed or camouflaged explosive device (e.g., EFPs and IEDs) from a safe stand-off distance. Apparatus, system and/or methods of the disclosure may also be operable to identify and/or spatially locate and/or detect an explosive device. An apparatus or system may comprise an x-ray generator that generates high-energy x-rays and/or electrons operable to contact and activate a metal comprised in an explosive device from a stand-off distance; and a detector operable to detect activation of the metal. Identifying an explosive device may comprise detecting characteristic radiation signatures emitted by metals specific to an EFP, an IED or a landmine. Apparatus and systems of the disclosure may be mounted on vehicles and methods of the disclosure may be performed while moving in the vehicle and from a safe stand-off distance.
Detection and Localization of Money Bills Concealed Behind Wooden Walls Using Compton Scattering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wart, Jason A. van; Hussein, Esam M.A.; Waller, Edward J
2005-05-15
This work presents a portable device for detecting visually obscured contraband money bills that may be hidden within conventional household walls for the purpose of avoiding confiscation. The device utilizes the Compton backscattering of photons emitted from a collimated {sup 241}Am source. The scattered photons are detected with a thin NaI(Tl) detector, either over a wide field of view for surface scanning of the wall or within a confined view field for depth scanning. The design of the device was optimized for best density contrast and highest count rate for a given source activity. It was shown that the minimummore » detectable amount of contraband, with >95% confidence level, is 86 paper bills. The contraband was detectable when hidden in household walls made of gyprock or wooden paneling, even when masked by higher density materials such as metallic piping. The device's capability exceeded those of commercially available density-based portable contraband detectors.« less
ELECTROCHEMICAL TECHNIQUE FOR DETECTION OF TNT USING DISPOSABLE SCREEN-PRINTED ELECTRODES
Nitroaromatic and nitroamine explosives have been found in the soil and water from many government military bases due to disposal, storage and weapons testing. Run-off from contaminated soil and water can enter groundwater and potentially contaminate drinking water for near-by ...
EURITRACK tagged neutron inspection system design
NASA Astrophysics Data System (ADS)
Perret, G.; Perot, B.; Artaud, J.-L.; Mariani, A.
2006-05-01
The EURITRACK project aims at developing a non-destructive measurement system, using an associated particle sealed tube neutron generator, to detect explosives or other threat materials concealed in cargo containers. Chemical composition of the suspect item is determined by coincidence measurements between alpha particles and photons resulting from neutron interactions in the inspected voxel of the container. We present the design and the performances of the measurement system obtained by Monte Carlo calculations. Selected gamma detectors are clusters of 5''×5''×10'' and 5''×5'' sodium iodide scintillators, and a block of 100 kg of TNT located in a container filled with a metallic matrix having a density of 0.2 g/cm3 is shown to be detectable in 10 minutes.
Identifying the location of a concealed object through unintentional eye movements
Neuman, Yair; Assaf, Dan; Israeli, Navot
2015-01-01
In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879
Williams, Charlotte J; Cropley, Mark
2014-10-01
If perfectionists avoid engaging in preventive health behaviours, they may be putting their long-term health and well-being at risk. Correlational analyses based on a sample of 370 university students identified maladaptive perfectionism to be associated with decreased levels of engagement in preventive health behaviours, life satisfaction and well-being and increased levels of self-concealment and psychological distress. Adaptive perfectionism was associated with higher levels of engagement in preventive health behaviours. Self-concealment was identified as a partial mediator in the relationship between maladaptive perfectionism and both engagement in preventive health behaviours and psychological distress. Implications of the findings are discussed. © The Author(s) 2013.
Being and feeling unique: statistical deviance and psychological marginality.
Frable, D E
1993-03-01
Two studies tested the hypothesis that people with culturally stigmatized and concealable conditions (e.g., gays, epileptics, juvenile delinquents, and incest victims) would be more likely to feel unique than people with culturally valued or conspicuous conditions (e.g., the physically attractive, the intellectually gifted, the obese, and the facially scarred). In Study 1, culturally stigmatized individuals with concealable conditions were least likely to perceive consensus between their personal preferences and those of others. In Study 2, they were most likely to describe themselves as unique and to make these self-relevant decisions quickly. Marginality is a psychological reality, not just a statistical one, for those with stigmatized and concealable "master status" conditions.
Assessment of Waco, Texas FLIR videotape
NASA Astrophysics Data System (ADS)
Frankel, Donald S.
2001-09-01
The FLIR video recorded by the FBI on 19 April 1993, records the final assault on the Branch Davidian compound in Waco, Texas, and the fire in which some 80 members of the sect died. Attention has focused on a number of flashes recorded on the videotape. The author has examined the 1993 videotape and the recorded videotapes of the re-enactment conducted at Fort Hood, Texas on 19 March 2000. The following conclusions have been reached: 1) The flashes seen on the tape cannot be weapons muzzle flash. Their duration is far too long and their spatial extent is far too great. They are almost certainly the result of solar energy or heat energy form nearby vehicles reflected toward the FLIR by debris or puddles. 2) The FLIR video technology has a very low probability of detecting small arms muzzle flash. 3) As a consequence of 2) above, the absence of muzzle flash detection on the FLIR tape does not prove that no weapons were actually fired during the final assault. Indeed, there is ample evidence (not presented here) that the Davidians fired at the federal agents, but none of their muzzle flashes are detectable on the videotape.
Do Children Understand That People Selectively Conceal or Express Emotion?
ERIC Educational Resources Information Center
Hayashi, Hajimu; Shiomi, Yuki
2015-01-01
This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…
The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model
ERIC Educational Resources Information Center
Pachankis, John E.
2007-01-01
Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…
The Cost of Question Concealment: Eye-Tracking and MEG Evidence
ERIC Educational Resources Information Center
Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven
2008-01-01
Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…
Turkey habitat use and nesting characteristics in ponderosa pine
Mark A. Rumble; Stanley H. Anderson
1987-01-01
Turkeys (Meleagris gallapovo) selected nest sites that provided good horizontal concealment. Rock or rock outcrops were selected most frequently for nest concealment on first-nest attempts. Renest attempts showed a selection preference for shrubs as nest cover; most of these were located in meadows. Nesting success doubled for renests versus first...
Gender-specific health implications of minority stress among lesbians and gay men.
Bariola, Emily; Lyons, Anthony; Leonard, William
2016-12-01
Lesbians and gay men are exposed to unique minority stressors. We examined the health implications of one type of distal minority stressor (victimisation) and one type of proximal minority stressor (sexual identity concealment due to anticipated stigma) among lesbians and gay men. Gender-specific health implications were assessed. Data were collected via an online survey involving an Australian sample of 1,470 gay men and 1,264 lesbians. Survey questions assessed demographics, experiences of different forms of sexual identity-related victimisation and sexual identity concealment in a variety of contexts. Health outcomes included self-reported general health, illicit drug use, frequency of alcohol consumption, smoking status, and weight status. Gay men reported higher rates of victimisation and identity concealment than lesbians. Controlling for demographic differences, experiences of victimisation were associated with poorer self-rated health, illicit drug use, and smoking among both gay men and lesbians. In contrast, identity concealment was linked with poorer health outcomes among lesbians only. Our findings offer new insights into the potential antecedents of the health inequalities that have previously been reported for these populations. © 2016 Public Health Association of Australia.
The role of the Biological Weapons Convention in disease surveillance and response.
Enemark, Christian
2010-11-01
This article assesses the role and significance of the Biological Weapons Convention (BWC) with respect to infectious disease surveillance and response to outbreaks. Increasingly, the BWC is being used as a platform for addressing infectious disease threats arising naturally as well as traditional concerns about malicious dissemination of pathogenic microorganisms. The latter have long had a place on the security agenda, but natural disease outbreaks too are now being partially 'securitized' through the use of the BWC as a forum for exchanging information and ideas on disease surveillance and response. The article focuses on two prominent issues discussed at recent meetings of BWC member states: enhancing capacity for disease surveillance and response; and responding to allegations of biological weapons use and investigating outbreaks deemed suspicious. It concludes, firstly, that the BWC supports the efforts of international health organizations to enhance disease surveillance and response capacity worldwide. And secondly, that the BWC, rather than the World Health Organization (WHO), is the appropriate institution to deal with biological weapons allegations and investigations of suspicious outbreaks. The overall message is that securitization in the health sphere cuts both ways. Adding a security dimension (BW) alongside the task of detecting and responding to naturally occurring disease outbreaks is beneficial, but requiring a non-security organization (the WHO) to assume a security role would be counterproductive.
Effects of modified penoplasty for concealed penis in children.
Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan
2016-10-01
To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p < 0.05). The patients' satisfaction grades after the surgery were improved significantly (p < 0.05). Fifty-two patients had penile lymphedema postoperatively; however, it disappeared spontaneously within 3 months. Additionally, postoperative wound infection occurred in two patients. There were no complications such as flap necrosis, penile shaft contracture, voiding difficulty, and erection difficulties. The modified Shiraki phalloplasty for concealed penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.
Kanaujia, Pankaj K; Tak, Vijay; Pardasani, Deepak; Gupta, A K; Dubey, D K
2008-03-28
The analysis of nitrogen containing amino alcohols, which are the precursors and degradation products of nitrogen mustards and nerve agent VX, constitutes an important aspect for verifying the compliance to the CWC (Chemical Weapons Convention). This work devotes on the development of solid-phase extraction method using silica- and polymer-based SCX (strong cation-exchange) and MCX (mixed-mode strong cation-exchange) cartridges for N,N-dialkylaminoethane-2-ols and alkyl N,N-diethanolamines, from water. The extracted analytes were analyzed by GC-MS (gas chromatography-mass spectrometry) in the full scan and selected ion monitoring modes. The extraction efficiencies of SCX and MCX cartridges were compared, and results revealed that SCX performed better. Extraction parameters, such as loading capacity, extraction solvent, its volume, and washing solvent were optimized. Best recoveries were obtained using 2 mL methanol containing 10% NH(4)OH and limits of detection could be achieved up to 5 x 10(-3) microg mL(-1) in the selected ion monitoring mode and 0.01 microg mL(-1) in full scan mode. The method was successfully employed for the detection and identification of amino alcohol present in water sample sent by Organization for Prohibition of Chemical Weapons (OPCW) in the official proficiency tests. The method was also applied to extract the analytes from human plasma. The SCX cartridge showed good recoveries of amino alcohols from human plasma after protein precipitation.
Optoelectronics applications in multimedia shooting training systems: SPARTAN
NASA Astrophysics Data System (ADS)
Glogowski, Tomasz; Hlosta, Pawel; Stepniak, Slawomir; Swiderski, Waldemar
2017-10-01
Multimedia shooting training systems are increasingly being used in the training of security staff and uniformed services. An advanced practicing-training system SPARTAN for simulation of small arms shooting has been designed and manufactured by Autocomp Management Ltd. and Military Institute of Armament Technology for the Polish Ministry of National Defence. SPARTAN is a stationary device designed to teach, monitor and evaluate the targeting of small arms and to prepare soldiers for: • firing the live ammunition at open ranges for combat targets and silhouettes • detection, classification and engagement of real targets upon different terrains, weather conditions and periods during the day • team work as a squad during the mission by using different types of arms • suitable reactions in untypical scenarios. Placed in any room the training set consists of: • the projection system that generates realistic 3D imaging of the battlefield (such as combat shooting range) in high-resolution • system that tracks weapons aiming points • sound system which delivers realistic mapping of acoustic surroundings • operator station with which the training is conducted and controlled • central processing unit based on PC computers equipped with specialist software realizing individual system functions • units of smart weapons equipped with radio communication modules, injection laser diodes and pneumatic reloading system. The system make possible training by firing in dynamic scenarios, using combat weapons and live ammunition against visible targets moving on a screen. The use of infrared camera for detecting the position of impact of a projectile.
Building A Better Force: Regular Army / Reserve Components Integration In The Army Chemical Corps
2016-05-26
the Reserve Components (RCs) assumed sole responsibility for providing the Army with smoke, heavy decontamination, and biological detection ...production of anthrax.20 In 2010, al Qaeda in the Arabian Peninsula urged "brothers with degrees in microbiology or chemistry …to develop a weapon of mass...Army’s generated smoke, heavy decontamination, and biological detection units. This places a greater reliance on the RCs for unique, low density
GaTe semiconductor for radiation detection
Payne, Stephen A [Castro Valley, CA; Burger, Arnold [Nashville, TN; Mandal, Krishna C [Ashland, MA
2009-06-23
GaTe semiconductor is used as a room-temperature radiation detector. GaTe has useful properties for radiation detectors: ideal bandgap, favorable mobilities, low melting point (no evaporation), non-hygroscopic nature, and availability of high-purity starting materials. The detector can be used, e.g., for detection of illicit nuclear weapons and radiological dispersed devices at ports of entry, in cities, and off shore and for determination of medical isotopes present in a patient.
Detection of impulsive sources from an aerostat-based acoustic array data collection system
NASA Astrophysics Data System (ADS)
Prather, Wayne E.; Clark, Robert C.; Strickland, Joshua; Frazier, Wm. Garth; Singleton, Jere
2009-05-01
An aerostat based acoustic array data collection system was deployed at the NATO TG-53 "Acoustic Detection of Weapon Firing" Joint Field Experiment conducted in Bourges, France during the final two weeks of June 2008. A variety of impulsive sources including mortar, artillery, gunfire, RPG, and explosive devices were fired during the test. Results from the aerostat acoustic array will be presented against the entire range of sources.
Emerging electro-optical technologies for defense applications
NASA Astrophysics Data System (ADS)
Venkateswarlu, Ronda; Ser, W.; Er, Meng H.; Chan, Philip
1999-11-01
Technological breakthroughs in the field of imaging and non- imaging sensor sand the related signal processors helped the military users to achieve 'force multiplication'. Present day 'smart-weapon systems' are being converted to 'brilliant-weapon systems' to bridge the gap until the most potent new 'fourth generation systems' come on line based on nanotechnology. The recent military tactics have evolved to take advantage of ever improving technologies to improve the quality and performance over time. The drive behind these technologies is to get a first-pass-mission-success against the target with negligible collateral damage, protecting property and the lives of non-combatants. These technologies revolve around getting target information, detection, designation, guidance, aim-point selection, and mission accomplishment. The effectiveness of these technologies is amply demonstrated during recent wars. This paper brings out the emerging trends in visible/IR/radar smart-sensors and the related signal processing technologies that lead to brilliant guided weapon systems. The purpose of this paper is to give an overview to the readers about futuristic systems. This paper also addresses various system configurations including sensor-fusion.
Carrell, David; Malin, Bradley; Aberdeen, John; Bayer, Samuel; Clark, Cheryl; Wellner, Ben; Hirschman, Lynette
2013-01-01
Secondary use of clinical text is impeded by a lack of highly effective, low-cost de-identification methods. Both, manual and automated methods for removing protected health information, are known to leave behind residual identifiers. The authors propose a novel approach for addressing the residual identifier problem based on the theory of Hiding In Plain Sight (HIPS). HIPS relies on obfuscation to conceal residual identifiers. According to this theory, replacing the detected identifiers with realistic but synthetic surrogates should collectively render the few 'leaked' identifiers difficult to distinguish from the synthetic surrogates. The authors conducted a pilot study to test this theory on clinical narrative, de-identified by an automated system. Test corpora included 31 oncology and 50 family practice progress notes read by two trained chart abstractors and an informaticist. Experimental results suggest approximately 90% of residual identifiers can be effectively concealed by the HIPS approach in text containing average and high densities of personal identifying information. This pilot test suggests HIPS is feasible, but requires further evaluation. The results need to be replicated on larger corpora of diverse origin under a range of detection scenarios. Error analyses also suggest areas where surrogate generation techniques can be refined to improve efficacy. If these results generalize to existing high-performing de-identification systems with recall rates of 94-98%, HIPS could increase the effective de-identification rates of these systems to levels above 99% without further advancements in system recall. Additional and more rigorous assessment of the HIPS approach is warranted.
Flexible weapons architecture design
NASA Astrophysics Data System (ADS)
Pyant, William C., III
Present day air-delivered weapons are of a closed architecture, with little to no ability to tailor the weapon for the individual engagement. The closed architectures require weaponeers to make the target fit the weapon instead of fitting the individual weapons to a target. The concept of a flexible weapons aims to modularize weapons design using an open architecture shell into which different modules are inserted to achieve the desired target fractional damage while reducing cost and civilian casualties. This thesis shows that the architecture design factors of damage mechanism, fusing, weapons weight, guidance, and propulsion are significant in enhancing weapon performance objectives, and would benefit from modularization. Additionally, this thesis constructs an algorithm that can be used to design a weapon set for a particular target class based on these modular components.
Proliferation of nuclear weapons: opportunities for control and abolition.
Sidel, Victor W; Levy, Barry S
2007-09-01
Nuclear weapons pose a particularly destructive threat. Prevention of the proliferation and use of nuclear weapons is urgently important to public health. "Horizontal" proliferation refers to nation-states or nonstate entities that do not have, but are acquiring, nuclear weapons or developing the capability and materials for producing them. "Vertical" proliferation refers to nation-states that do possess nuclear weapons and are increasing their stockpiles of these weapons, improving the technical sophistication or reliability of their weapons, or developing new weapons. Because nation-states or other entities that wish to use or threaten to use nuclear weapons need methods for delivering those weapons, proliferation of delivery mechanisms must also be prevented. Controlling proliferation--and ultimately abolishing nuclear weapons--involves national governments, intergovernmental organizations, nongovernmental and professional organizations, and society at large.
On the optimisation of the use of 3He in radiation portal monitors
NASA Astrophysics Data System (ADS)
Tomanin, Alice; Peerani, Paolo; Janssens-Maenhout, Greet
2013-02-01
Radiation Portal Monitors (RPMs) are used to detect illicit trafficking of nuclear or other radioactive material concealed in vehicles, cargo containers or people at strategic check points, such as borders, seaports and airports. Most of them include neutron detectors for the interception of potential plutonium smuggling. The most common technology used for neutron detection in RPMs is based on 3He proportional counters. The recent severe shortage of this rare and expensive gas has created a problem of capacity for manufacturers to provide enough detectors to satisfy the market demand. In this paper we analyse the design of typical commercial RPMs and try to optimise the detector parameters in order either to maximise the efficiency using the same amount of 3He or minimise the amount of gas needed to reach the same detection performance: by reducing the volume or gas pressure in an optimised design.
Youths carrying a weapon or using a weapon in a fight: what makes the difference?
Thurnherr, Judit; Michaud, Pierre-André; Berchtold, André; Akré, Christina; Suris, Joan-Carles
2009-04-01
The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were divided into those who had used it in a fight and those who had not. Individual, family, school and social factors were analyzed using bivariate and stepwise multivariate analysis. For both genders, delinquent behavior and being victim of physical violence were associated with weapon carrying. For males, quarreling while intoxicated, being an apprentice, being sensation seekers, having a tattoo, having a poor relationship with parents and practicing unsafe sex were also related to weapon carrying. Compared with weapon carriers, female weapon users were more likely to be regular smokers. Male weapon users were foreign born, urban and apprentices; had poor school connectedness; practiced unsafe sex and quarreled while intoxicated. Carrying a weapon is a relatively frequent behavior among youths in Switzerland and a sizeable proportion of weapon carriers have used it in a fight. Weapon carrying should be part of the clinical assessment and preventive counseling of adolescents. Preventive programs specific for at-risk youth groups need to be developed.
Development of a quail embryo model for the detection of botulinum neurotoxin activity
USDA-ARS?s Scientific Manuscript database
Clostridium botulinum is a ubiquitous microorganism that under anaerobic conditions produces botulinum neurotoxins. In regards to both food-borne illness and the potential use of botulinum toxin as a biological weapon, the capability to assess the amount of toxin in a food or environmental sample e...
REMOTE SENSING IN DETECTING BURIED MUNITIONS FROM WORLD WAR I
During World War I, The American University in Washington D.C. was used by the U.S. Army as an experiment station for the development and testing of a variety of battlefield munitions including chemical weapons such as Mustard Gas, Phosgene, Ricin and Lewisite, among othe...
Voitenko, N G; Garniuk, V V; Prokofieva, D S; Gontcharov, N V
2015-01-01
The work was aimed to find new screeding parameters (biomarkers) for evaluation of health state of workers engaged into enterprises with hazardous work conditions, as exemplified by "Maradykovskyi" object of chemical weapons extinction. Analysis of 27 serum cytokines was conducted in donors and the object personnel with various work conditions. Findings are statistically significant increase of serum eotaxin in the personnel of "dirty" zone, who are regularly exposed to toxic agents in individual filter protective means over the working day. For screening detection of health disorders in the object personnel, the authors suggested new complex biomarker--ratio Eotaxin* IFNγ/TNFα that demonstrates 67.9% sensitivity and 87.5% specificity in differentiating the "dirty" zone personnel and other staffers.
Nuclear disarmament verification via resonant phenomena.
Hecla, Jake J; Danagoulian, Areg
2018-03-28
Nuclear disarmament treaties are not sufficient in and of themselves to neutralize the existential threat of the nuclear weapons. Technologies are necessary for verifying the authenticity of the nuclear warheads undergoing dismantlement before counting them toward a treaty partner's obligation. Here we present a concept that leverages isotope-specific nuclear resonance phenomena to authenticate a warhead's fissile components by comparing them to a previously authenticated template. All information is encrypted in the physical domain in a manner that amounts to a physical zero-knowledge proof system. Using Monte Carlo simulations, the system is shown to reveal no isotopic or geometric information about the weapon, while readily detecting hoaxing attempts. This nuclear technique can dramatically increase the reach and trustworthiness of future nuclear disarmament treaties.
ERIC Educational Resources Information Center
Cepeda-Benito, Antonio; Short, Paul
1998-01-01
New information about the role of self-concealment in the decision to seek psychological services is investigated. Different types of distress selectively predict students' perceived likelihood of seeking help according to the problems for which help would be sought (N=732). Results are discussed in contrast to previous researchers' findings. (EMK)
Concealment of Child Sexual Abuse in Sports
ERIC Educational Resources Information Center
Hartill, Mike
2013-01-01
When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…
ERIC Educational Resources Information Center
Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen
2014-01-01
Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…
A hybrid frame concealment algorithm for H.264/AVC.
Yan, Bo; Gharavi, Hamid
2010-01-01
In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.
Youths Carrying a Weapon or Using a Weapon in a Fight: What Makes the Difference?
ERIC Educational Resources Information Center
Thurnherr, Judit; Michaud, Pierre-Andre; Berchtold, Andre; Akre, Christina; Suris, Joan-Carles
2009-01-01
The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were…
NASA Astrophysics Data System (ADS)
Aghamaleki, Javad Abbasi; Behrad, Alireza
2018-01-01
Double compression detection is a crucial stage in digital image and video forensics. However, the detection of double compressed videos is challenging when the video forger uses the same quantization matrix and synchronized group of pictures (GOP) structure during the recompression history to conceal tampering effects. A passive approach is proposed for detecting double compressed MPEG videos with the same quantization matrix and synchronized GOP structure. To devise the proposed algorithm, the effects of recompression on P frames are mathematically studied. Then, based on the obtained guidelines, a feature vector is proposed to detect double compressed frames on the GOP level. Subsequently, sparse representations of the feature vectors are used for dimensionality reduction and enrich the traces of recompression. Finally, a support vector machine classifier is employed to detect and localize double compression in temporal domain. The experimental results show that the proposed algorithm achieves the accuracy of more than 95%. In addition, the comparisons of the results of the proposed method with those of other methods reveal the efficiency of the proposed algorithm.
Sandia National Laboratories: National Security Missions: Nuclear Weapons:
Safety & Security Sandia National Laboratories Exceptional service in the national interest & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Twitter YouTube Flickr RSS Top Nuclear Weapons About Nuclear Weapons at Sandia Safety & Security